Last update:
Wed May 26 07:06:49 MDT 2021
D. Towsley Allocating programs containing branches and loops within a multiple processor system . . . . . . . . . . . . . . . . . 1018--1024
T. Y. Cheung On the projection method for protocol verification . . . . . . . . . . . . . . 1088--1089
C. C. Yang and G. Li and P. A. B. Ng An improved algorithm based on subset closures for synthesizing a relational database scheme . . . . . . . . . . . . 1731--1738
G. M. Karam and C. M. Stanczyk and G. W. Bond Critical races in Ada programs . . . . . 1471--1480
N. R. Howes and A. C. Weaver Measurements of Ada overhead in OSI-style communications systems . . . . 1507--1517
C. P. Gerrard and D. Coleman and R. M. Gallimore Formal specification and design time testing . . . . . . . . . . . . . . . . 1--12 Guo-Jie Li and B. W. Wah Computational efficiency of parallel combinatorial OR-tree searches . . . . . 13--31 E. Barcucci and R. Pinzani Optimal selection of secondary indexes 32--38 R. G. Willson and B. H. Krogh Petri net tools for the specification and analysis of discrete controllers . . 39--50 L. K. Dillon Verifying general safety properties of Ada tasking programs . . . . . . . . . . 51--63 G. C. Low and D. R. Jeffery Function points in the estimation and evaluation of the software process . . . 64--71 W. E. Howden Comments analysis and programming errors 72--81 R. C. De Vries Reducing null messages in Misra's distributed discrete event simulation method . . . . . . . . . . . . . . . . . 82--91 S. B. Yadav Control and definition modularization: an improved software design technique for organizing programs . . . . . . . . 92--99 C. K. Chang Bidding against competitors . . . . . . 100--104
J. C. Browne and T. Lee and J. Werth Experimental evaluation of a reusability-oriented parallel programming environment . . . . . . . . 111--120 E. J. Weyuker The cost of data flow testing: an empirical study . . . . . . . . . . . . 121--128 B. G. Ryder and W. Landi and H. D. Pande Profiling an incremental data flow analysis algorithm . . . . . . . . . . . 129--140 Y. Levendel Reliability analysis of large software systems: defect data modeling . . . . . 141--152 J. P. J. Kelly and S. C. Murphy Achieving dependability throughout the development process: a distributed software experiment . . . . . . . . . . 153--165 J. Arlat and M. Aguera and L. Amat and Y. Crouzet and J. C. Fabre and J. C. Laprie and E. Martins and D. Powell Fault injection for dependability validation: a methodology and some applications . . . . . . . . . . . . . . 166--182 V. Balasubramanian and P. Banerjee Tradeoffs in the design of efficient algorithm-based error detection schemes for hypercube multiprocessors . . . . . 183--196 D. Haban and D. Wybranietz A hybrid monitor for behavior and performance analysis of distributed systems . . . . . . . . . . . . . . . . 197--211 M. H. Woodbury and K. G. Shin Measurement and analysis of workload effects on fault latency in real-time systems . . . . . . . . . . . . . . . . 212--216 K. Gallivan and D. Gannon and W. Jalby and A. Malony and H. Wijshoff Experimentally characterizing the behavior of multiprocessor memory systems: a case study . . . . . . . . . 216--223 N. Gorla and A. C. Benander and B. A. Benander Debugging effort estimation using software metrics . . . . . . . . . . . . 223--231 B. Mortazavi Performance of MAP in the remote operation of a CNC . . . . . . . . . . . 231--237 S. S. Brilliant and J. C. Knight and N. G. Leveson Analysis of faults in an $N$-version software experiment . . . . . . . . . . 238--247 D. W. Cornell and P. S. Yu An effective approach to vertical partitioning for physical design of relational databases . . . . . . . . . . 248--258
F. A. Feldman A new spectral test for nonrandomness and the DES . . . . . . . . . . . . . . 261--267 K. M. Olender and L. J. Osterweil Cecil: a sequencing constraint language for automatic static analysis generation 268--280 J. L. Gaudiot and A. Sohn Data-driven parallel production systems 281--293 J. R. Cordy and N. L. Eliot and M. G. Robertson TuringTool: a user interface to aid in the software maintenance task . . . . . 294--301 T. Ibaraki and T. Kameda and N. Katoh Multiversion cautious schedulers for database concurrency control . . . . . . 302--315 W. T. Tsai and D. Volovik and T. F. Keefe Automated test case generation for programs specified by relational algebra queries . . . . . . . . . . . . . . . . 316--324 Y. F. Chen and M. Y. Nishimoto and C. V. Ramamoorthy The C information abstraction system . . 325--334 S. K. Debray and D. S. Warren Towards banishing the cut from Prolog 335--349 V. F. Nicola and A. Goyal Modeling of correlated failures and community error recovery in multiversion software . . . . . . . . . . . . . . . . 350--359 J. Xu and D. L. Parnas Scheduling processes with release times, deadlines, precedence and exclusion relations . . . . . . . . . . . . . . . 360--369 Y. Hirakawa Comments, with reply, on ``On the projection method for protocol verification'' by T.-Y. Cheung . . . . . 370--371
L. Y. Liu and R. K. Shyamasundar Static analysis of real-time distributed systems . . . . . . . . . . . . . . . . 373--388 J. M. Bishop The effect of data abstraction on loop programming techniques . . . . . . . . . 389--402 D. Harel and H. Lachover and A. Naamad and A. Pnueli and M. Politi and R. Sherman and A. Shtull-Trauring and M. Trakhtenbrot STATEMATE: a working environment for the development of complex reactive systems 403--414 A. Itai and S. Kutten and Y. Wolfstahl and S. Zaks Optimal distributed $t$-resilient election in complete networks . . . . . 415--420 R. Gupta and M. L. Soffa Region scheduling: an approach for detecting and redistributing parallelism 421--431 N. G. Leveson and S. S. Cha and J. C. Knight and T. J. Shimeall The use of self checks and voting in software error detection: an empirical study . . . . . . . . . . . . . . . . . 432--443 Y. B. Shieh and D. Ghosal and P. R. Chintamaneni and S. K. Tripathi Modeling of hierarchical distributed systems with fault-tolerance . . . . . . 444--457 S. Brocklehurst and P. Y. Chan and B. Littlewood and J. Snell Recalibrating software reliability models . . . . . . . . . . . . . . . . . 458--470 F. Kaudel Comments on ``Allocating programs containing branches and loops within a multiple processor system'' by D. Towsley . . . . . . . . . . . . . . . . 471 R. A. Nicholl Unreachable states in model-oriented specifications . . . . . . . . . . . . . 472--477 D. Towsley Correction to ``Allocating programs containing branches and loops within a multiple processor system'' . . . . . . 472 M. H. Eich and S. M. Garard The performance of flow graph locking 477--483 D. Callahan and A. Carle and M. W. Hall and K. Kennedy Constructing the procedure call multigraph . . . . . . . . . . . . . . . 483--487
G. M. Karam Computational improvements in Prolog applications by predicate variable pointers . . . . . . . . . . . . . . . . 490--497 L. E. Moser Data dependency graphs for Ada programs 498--509 L. A. Laranjeira Software size estimation of object-oriented systems . . . . . . . . 510--522 T. Suzuki and S. M. Shatz and T. Murata A protocol modeling and verification approach based on a specification language and Petri nets . . . . . . . . 523--536 D. Hoffman On criteria for module interfaces . . . 537--542 C. Ding and P. Mateti A framework for the automated drawing of data structure diagrams . . . . . . . . 543--557 J. K. Mullin Optimal semijoins for distributed database systems . . . . . . . . . . . . 558--560
D. McCullough A hookup theorem for multilevel security 563--568 C. R. Tsai and V. D. Gligor and C. S. Chandersekaran On the identification of covert storage channels in secure systems . . . . . . . 569--580 C. F. Yu and V. D. Gligor A specification and verification method for preventing denial of service . . . . 581--592 T. F. Lunt and D. E. Denning and R. R. Schell and M. Heckman and W. R. Shockley The SeaView security model . . . . . . . 593--607 J. L. Berger and J. Picciotto and J. P. L. Woodward and P. T. Cummings Compartmented mode workstation: prototype highlights . . . . . . . . . . 608--618 S. R. White and L. Comerford ABYSS: an architecture for software protection . . . . . . . . . . . . . . . 619--629 D. Hildum and J. Cohen A language for specifying program transformations . . . . . . . . . . . . 630--638 S. Leong and S. Jodis and K. Sullivan and O. Jiang and P. A. D. de Maine A transportable programming language (TPL) system. II. The bifunctional compiler system . . . . . . . . . . . . 639--646 W. P. Lu and M. K. Sundareshan A model for multilevel security in computer networks . . . . . . . . . . . 647--659 M. Dubois and C. Scheurich Memory access dependencies in shared-memory multiprocessors . . . . . 660--673
D. Sarkar and N. Deo Estimating the speedup in parallel parsing . . . . . . . . . . . . . . . . 677--683 I. K. Ryu and A. Thomasian Performance analysis of dynamic locking with the no-waiting policy . . . . . . . 684--698 C. E. Houstics Module allocation of real-time applications to distributed systems . . 699--709 J. W. Stamos and D. K. Gifford Implementing remote evaluation . . . . . 710--722 M. G. Burke and B. G. Ryder A critical analysis of incremental iterative data flow analysis algorithms 723--728 L. J. Chmura and A. F. Norcio and T. J. Wicinski Evaluating software design processes by analyzing change data over time . . . . 729--740 D. Hemmendinger Specifying Ada server tasks with executable formal grammars . . . . . . . 741--754 S. S. Lam and A. U. Shankar A relational notation for state transition systems . . . . . . . . . . . 755--775
V. M. Markowitz and J. A. Makowsky Identifying extended entity-relationship object structures in relational schemas 777--790 B. Ciciani and D. M. Dias and B. R. Iyer and P. S. Yu A hybrid distributed centralized system structure for transaction processing . . 791--806 V. F. Nicola and J. M. van Spanje Comparative analysis of different models of checkpointing and recovery . . . . . 807--821 V. De Antonellis and B. Zonta A disciplined approach to office analysis . . . . . . . . . . . . . . . . 822--828 G. M. Karam and R. J. A. Buhr Starvation and critical race analyzers for Ada . . . . . . . . . . . . . . . . 829--843 L. J. Morell A theory of fault-based testing . . . . 844--857 A. Valenzano and P. Montuschi and L. Ciminiera Some properties of timed token medium access protocols . . . . . . . . . . . . 858--869 B. Korel Automated software test data generation 870--879 J. C. Huang State constraints and pathwise decomposition of programs . . . . . . . 880--896 J. J. P. Tsai and K. Y. Fang and H. Y. Chen and Y. D. Bi A noninterference monitoring and replay mechanism for real-time software testing and debugging . . . . . . . . . . . . . 897--916 Luqi A graph model for software evolution . . 917--927
A. P. Moore The specification and verified decomposition of system requirements using CSP . . . . . . . . . . . . . . . 932--948 F. K. Hanna and N. Daeche and M. Longley Specification and verification using dependent types . . . . . . . . . . . . 949--964 A. Podgurski and L. A. Clarke A formal model of program dependences and its implications for software testing, debugging, and maintenance . . 965--979 M. Moriconi and T. C. Winkler Approximate reasoning about the semantic effects of program changes . . . . . . . 980--992 A. J. Camilleri Mechanizing CSP trace theory in higher order logic . . . . . . . . . . . . . . 993--1004 D. M. Goldschlag Mechanically verifying concurrent programs with the Boyer--Moore prover 1005--1023 D. R. Smith KIDS: a semiautomatic program development system . . . . . . . . . . . 1024--1043 S. J. Garland and J. V. Guttag and J. J. Horning Debugging Larch shared language specifications . . . . . . . . . . . . . 1044--1057 D. Guaspari and C. Marceau and W. Polak Formal verification of Ada programs . . 1058--1075 J. M. Wing Using Larch to specify Avalon/C++ objects . . . . . . . . . . . . . . . . 1076--1088 K. T. Narayana and S. Dharap Formal specification of a look manager 1089--1103
R. V. Rubin and J. Walker and E. J. Golin Early experience with the Visual Programmer's WorkBench . . . . . . . . . 1107--1121 C. Crimi and A. Guercio and G. Pacini and G. Tortora and M. Tucci Automating visual language generation 1122--1135 S. K. Chang A visual language compiler for information retrieval by visual reasoning . . . . . . . . . . . . . . . 1136--1149 M. Angelaccio and T. Catarci and G. Santucci QBD*: a graphical query language with recursion . . . . . . . . . . . . . . . 1150--1163 M. Eisenstadt and J. Domingue and T. Rajan and E. Motta Visual knowledge engineering . . . . . . 1164--1177 M. Hirakawa and M. Tanaka and T. Ichikawa An iconic programming system, HI-VISUAL 1178--1184 A. Heydon and M. W. Maimone and J. D. Tygar and J. M. Wing and A. M. Zaremski Miro: visual specification of security 1185--1197 D. W. Craig and C. M. Woodside The rejection rate for tasks with random arrivals, deadlines, and preemptive scheduling . . . . . . . . . . . . . . . 1198--1208 G. N. Neufeld and Y. Yang The design and implementation of an ASN.1-C compiler . . . . . . . . . . . . 1209--1220
C. V. Ramamoorthy and Y. Usuda and A. Prakash and W. T. Tsai The evolution support environment system 1225--1234 M. Degl'Innocenti and G. L. Ferrari and G. Pacini and F. Turini RSF: a formalism for executable requirement specifications . . . . . . . 1235--1246 B. Hailpern and H. Ossher Extending objects to support multiple interfaces and access control . . . . . 1247--1257 M. V. Mannino and J. J. Choi and D. S. Batory The object-oriented functional data language . . . . . . . . . . . . . . . . 1258--1272 I. Suzuki Formal analysis of the alternating bit protocol by temporal Petri nets . . . . 1273--1281 Y. Wand and R. Weber An ontological model of an information system . . . . . . . . . . . . . . . . . 1282--1292 J. Kramer and J. Magee The evolving philosophers problem: dynamic change management . . . . . . . 1293--1306 G. Becker and L. Camarinopoulos A Bayesian estimation method for the failure rate of a possibly correct program . . . . . . . . . . . . . . . . 1307--1310 V. C. Barbosa Strategies for the prevention of communication deadlocks in distributed parallel programs . . . . . . . . . . . 1311--1316
M. Singhal Update transport: a new technique for update synchronization in replicated database systems . . . . . . . . . . . . 1325--1336 D. H. Pitt and D. E. Freestone The derivation of conformance tests from LOTOS specifications . . . . . . . . . . 1337--1343 J. Heering and P. Klint and J. Rekers Incremental generation of parsers . . . 1344--1351 D. A. Lamb Specification of iterators . . . . . . . 1352--1360 G. C. Roman and H. C. Cunningham Mixed programming metaphors in a shared dataspace model of concurrency . . . . . 1361--1373 D. Haban and K. G. Shin Application of real-time monitoring to scheduling tasks with random execution times . . . . . . . . . . . . . . . . . 1374--1389 M. A. Al-Mouhamed Lower bound on the number of processors and time for scheduling precedence graphs with communication costs . . . . 1390--1401 D. Hamlet and R. Taylor Partition testing does not inspire confidence [program testing] . . . . . . 1402--1411 M. H. Erdogmus and R. Johnston On the specification and synthesis of communicating processes . . . . . . . . 1412--1426 J. Milewski Functional data structures as updatable objects . . . . . . . . . . . . . . . . 1427--1432 S. D. Lang and Y. Manolopoulos Efficient expressions for completely and partly unsuccessful batched search of tree-structured files . . . . . . . . . 1433--1435 G. M. Karam Comments on ``Measurements of Ada overhead in OSI-style communications systems'' . . . . . . . . . . . . . . . 1435--1439 C. M. McNamee and R. A. Olsson Comments on ``Critical races in Ada programs'' . . . . . . . . . . . . . . . 1439 L. L. Constantine Comments, with reply, on ``On criteria for module interfaces'' by D. Hoffman 1440
I. Nakata and M. Sassa Programming with streams in a Pascal-like language . . . . . . . . . . 1--9 L. B. Protsko and P. G. Sorenson and J. P. Tremblay and D. A. Schaefer Towards the automatic generation of software diagrams . . . . . . . . . . . 10--21 N. Roussopoulos and L. Mark and T. Sellis and C. Faloutsos An architecture for high performance engineering information systems . . . . 22--33 B. A. Blake and K. Schwan Experimental evaluation of a real-time scheduler for a multiprocessor system 34--44 K. C. Tai and R. H. Carver and E. E. Obaid Debugging concurrent Ada programs by deterministic execution . . . . . . . . 45--63 N. C. Hutchinson and L. L. Peterson The $x$-Kernel: an architecture for implementing network protocols . . . . . 64--76 T. K. Sellis and L. Shapiro Query optimization for nontraditional database applications . . . . . . . . . 77--86 X. Zhang Performance measurement and modeling to evaluate various effects on a shared memory multiprocessor . . . . . . . . . 87--93
G. Florin and S. Natkin Generalization of queueing network product form solutions to stochastic Petri nets . . . . . . . . . . . . . . . 99--107 W. Henderson and P. G. Taylor Embedded processes in stochastic Petri nets . . . . . . . . . . . . . . . . . . 108--116 J. Campos and G. Chiola and M. Silva Ergodicity and throughput bounds of Petri nets with unique consistent firing count vector . . . . . . . . . . . . . . 117--125 I. Hatono and K. Yamagata and H. Tamura Modeling and online scheduling of flexible manufacturing systems using stochastic Petri nets . . . . . . . . . 126--132 J. Gait Stability, availability, and response in network file service . . . . . . . . . . 133--140 R. W. Selby and V. R. Basili Analyzing error-prone system structure 141--152 J. M. Purtilo and P. Jalote An environment for developing fault-tolerant software . . . . . . . . 153--159 C. Ghezzi and D. Mandrioli and S. Morasca and M. Pezze A unified high-level Petri net formalism for time-critical systems . . . . . . . 160--172 T. J. Shimeall and N. G. Leveson An empirical comparison of software fault tolerance and fault elimination 173--182 N. H. Minsky The imposition of protocols over open distributed systems . . . . . . . . . . 183--195 W. S. Humphrey and N. D. Singpurwalla Predicting (individual) software productivity . . . . . . . . . . . . . . 196--207
P. Zave An insider's evaluation of PAISLey . . . 212--225 H. B. Reubenstein and R. C. Waters The Requirements Apprentice: automated assistance for requirements acquisition 226--240 M. S. Jaffe and N. G. Leveson and M. P. E. Heimdahl and B. E. Melhart Software requirements analysis for real-time process-control systems . . . 241--258 B. Berthomieu and M. Diaz Modeling and verification of time dependent systems using time Petri nets 259--273 F. A. Etessami and G. S. Hura Rule-based design methodology for solving control problems . . . . . . . . 274--282 D. E. Perry and G. E. Kaiser Models of software development environments . . . . . . . . . . . . . . 283--295 G. Z. Qadah and L. J. Henschen and J. J. Kim Efficient algorithms for the instantiated transitive closure queries 296--309 F. Belli and P. Jedrzejowicz An approach to the reliability optimization of software with redundancy 310--312
N. D. Singpurwalla Determining an optimal time interval for testing and debugging software . . . . . 313--319 W. A. Muhanna Composite programs: hierarchical construction, circularity, and deadlocks 320--333 K. Kanoun and M. R. de Bastos Martini and J. M. de Souza A method for software reliability analysis and prediction application to the TROPICO-R switching system . . . . . 334--344 F. Zahedi and N. Ashrafi Software reliability allocation based on structure, utility, price, and cost . . 345--356 A. Braccini and A. Del Bimbo and E. Vicario Interprocess communication dependency on network load . . . . . . . . . . . . . . 357--369 J. C. Laprie and K. Kanoun and C. Beounes and M. Kaaniche The KAT (knowledge--action--transformation) approach to the modeling and evaluation of reliability and availability growth 370--382 R. A. DeMillo and R. J. Lipton Defining software by continuous, smooth functions . . . . . . . . . . . . . . . 383--384
A. Thomasian and I. K. Ryu Performance analysis of two-phase locking . . . . . . . . . . . . . . . . 386--402 E. W. Krauser and A. P. Mathur and V. J. Rego High performance software testing on SIMD machines . . . . . . . . . . . . . 403--423 D. E. Harms and B. W. Weide Copying and swapping: influences on the design of reusable software components 424--435 B. Dimitrov and Z. Khalil and N. Kolev and P. Petrov On the optimal total processing time using checkpoints . . . . . . . . . . . 436--442 D. Ghosal and G. Serazzi and S. K. Tripathi The processor working set and its use in scheduling multiprocessor systems . . . 443--453 M. D. Fraser and K. Kumar and V. K. Vaishnavi Informal and formal requirements specification languages: bridging the gap . . . . . . . . . . . . . . . . . . 454--466 U. Hahn and M. Jarke and T. Rose Teamwork support in a knowledge-based information systems environment . . . . 467--482 Y. Tohma and H. Yamano and M. Ohba and R. Jacoby The estimation of parameters of the hypergeometric distribution and its application to the software reliability growth model . . . . . . . . . . . . . . 483--489
Y. Dotan and B. Arazi Using flat concurrent Prolog in system modeling . . . . . . . . . . . . . . . . 493--512 F. Belli and K. E. Grosspietsch Specification of fault-tolerant system issues by predicate/transition nets and regular expressions --- approach and case study . . . . . . . . . . . . . . . 513--526 S. Lee and S. Sluizer An executable language for modeling simple behavior . . . . . . . . . . . . 527--543 P. C. Chu A contingency approach to estimating record selectivities . . . . . . . . . . 544--552 R. S. Freedman Testability of software components . . . 553--564 A. Parrish and S. H. Zweben Analysis and refinement of software test data adequacy properties . . . . . . . . 565--581 M. van Genuchten Why is software late? An empirical study of reasons for delay in software development . . . . . . . . . . . . . . 582--590 S. Fujiwara and G. v. Bochmann and F. Khendek and M. Amalou and A. Ghedamsi Test selection based on finite state models . . . . . . . . . . . . . . . . . 591--603 C. Hsu and M. Bouziane and L. Rattner and L. Yee Information resources management in heterogeneous, distributed environments: A metadatabase approach . . . . . . . . 604--625 J. R. Callahan and J. M. Purtilo A packaging system for heterogeneous execution environments . . . . . . . . . 626--635 J. C. Cherniavsky and C. H. Smith On Weyuker's axioms for software complexity measures . . . . . . . . . . 636--638
J. F. Beetem and A. F. Beetem Incremental scanning and parsing with galaxy . . . . . . . . . . . . . . . . . 641--651 Z. M. Wojcik and B. E. Wojcik Rough grammar for efficient and fault-tolerant computing on a distributed system . . . . . . . . . . . 652--668 T. Shepard and J. A. M. Gagne A pre-run-time scheduling algorithm for hard real-time systems . . . . . . . . . 669--677 W. A. Litwin and N. Roussopoulos and G. Levy and W. Hong Trie Hashing with Controlled Load . . . 678--691 D. E. Eckhardt and A. K. Caglayan and J. C. Knight and L. D. Lee and D. F. McAllister and M. A. Vouk and J. P. J. Kelly An experimental evaluation of software redundancy as a strategy for improving reliability . . . . . . . . . . . . . . 692--702 E. J. Weyuker and B. Jeng Analyzing partition testing strategies 703--711 U. Halici and A. Dogac An optimistic locking technique for concurrency control in distributed databases . . . . . . . . . . . . . . . 712--724 T. Kunz The influence of different workload descriptions on a heuristic load balancing scheme . . . . . . . . . . . . 725--730 S. K. Mishra and V. V. Raghavan and N. F. Tzeng Efficient algorithms for selection of recovery points in tree task models . . 731--734
A. D. Stoyenko and V. C. Hamacher and R. C. Holt Analyzing hard-real-time programs for guaranteed schedulability . . . . . . . 737--750 K. B. Gallagher and J. R. Lyle Using program slicing in software maintenance . . . . . . . . . . . . . . 751--761 T. Niemi and K. Jarvelin Prolog-based meta-rules for relational database representation and manipulation 762--788 A. D. Kshemkalyani and M. Singhal Invariant-based verification of a distributed deadlock detection algorithm 789--799 Y. S. Maarek and D. M. Berry and G. E. Kaiser An information retrieval approach for automatically constructing software libraries . . . . . . . . . . . . . . . 800--813 G. Babin and F. Lustman and P. Shoval Specification and design of transactions in information systems: a formal approach . . . . . . . . . . . . . . . . 814--829 T. Nakajo and H. Kume A case history analysis of software error cause-effect relationships . . . . 830--838 L. M. Taff and J. W. Borchering and W. R. Hudgins Estimeetings: development estimates and a front-end process for a large project 839--849
F. Nishida and S. Takamatsu and Y. Fujita and T. Tani Semi-automatic program construction from specifications using library modules . . 853--871 D. G. Shin and K. B. Irani Fragmenting relations horizontally using a knowledge-based approach . . . . . . . 872--883 A. Coen-Porisini and F. De Paoli and C. Ghezzi and D. Mandrioli Software specialization via symbolic execution . . . . . . . . . . . . . . . 884--899 R. A. DeMillo and A. J. Offutt Constraint-based automatic test data generation . . . . . . . . . . . . . . . 900--910 M. G. Gouda and T. Herman Adaptive programming . . . . . . . . . . 911--921 C. G. Rommen The probability of load balancing success in a homogeneous network . . . . 922--933 D. M. Hoffman and P. Strooper Automated module testing in Prolog . . . 934--943 O. Wolfson and S. Sengupta and Y. Yemini Managing communication networks by monitoring databases . . . . . . . . . . 944--953 Y. Breitbart and D. Georgakopoulos and M. Rusinkiewicz and A. Silberschatz On rigorous transaction scheduling . . . 954--960 S. Cardenas-Garcia and M. V. Zelkowitz A management tool for evaluation of software design . . . . . . . . . . . . 961--971 Michael D. Vose A linear algorithm for generating random numbers with a given distribution . . . 972--975 S. C. Boyd and H. Ural On the complexity of generating optimal test sequences . . . . . . . . . . . . . 976--978 G. Graefe Heap-filter merge join: a new algorithm for joining medium-size inputs . . . . . 979--982
I. Ahmad and A. Ghafoor Semi-distributed load balancing for massively parallel multicomputer systems 987--1004 N. Yazia-Pekergin and J. M. Vincent Stochastic bounds on execution times of parallel programs . . . . . . . . . . . 1005--1012 A. Gupta and I. F. Akyildiz and R. M. Fujimoto Performance analysis of Time Warp with multiple homogeneous processors . . . . 1013--1027 I. P. Radivojevic and J. Herath Executing DSP applications in a fine-grained dataflow environment . . . 1028--1041 R. L. Bagrodia and C. C. Shen MIDAS: integrated design and simulation of distributed systems . . . . . . . . . 1042--1058 X. Zhang and X. Qin Performance prediction and evaluation of parallel processing on a NUMA multiprocessor . . . . . . . . . . . . . 1059--1068 J. Sztrik and D. Kouvatsos Asymptotic analysis of a heterogeneous multiprocessor system in a randomly changing environment . . . . . . . . . . 1069--1075 W. W. Chu and C. M. Sit and K. K. Leung Task response time for real-time distributed systems with resource contentions . . . . . . . . . . . . . . 1076--1092 B. Plateau and K. Atif Stochastic automata network of modeling parallel systems . . . . . . . . . . . . 1093--1108 G. M. Karam and R. J. A. Buhr Temporal logic-based deadlock analysis for Ada . . . . . . . . . . . . . . . . 1109--1125 K. Miriyala and M. T. Harandi Automatic derivation of formal software specifications from informal descriptions . . . . . . . . . . . . . . 1126--1142
P. A. Karger and M. E. Zurko and D. W. Bonin and A. H. Mason and C. E. Kahn A retrospective on the VAX VMM security kernel . . . . . . . . . . . . . . . . . 1147--1165 R. A. Kemmerer and P. A. Porras Covert flow trees: a visual approach to analyzing covert storage channels . . . 1166--1185 J. Jacob A uniform presentation of confidentiality properties . . . . . . . 1186--1194 G. W. Smith Modeling security-relevant data semantics . . . . . . . . . . . . . . . 1195--1203 G. S. Avrunin and U. A. Buy and J. C. Corbett and L. K. Dillon and J. C. Wileden Automated analysis of concurrent systems with the constrained expression toolset 1204--1222
K. W. E. Lor and D. M. Berry Automatic synthesis of SARA design models from system requirements . . . . 1229--1240 J. Han and L. Liu Efficient evaluation of multiple linear recursions . . . . . . . . . . . . . . . 1241--1252 J. C. S. P. Leite and P. A. Freeman Requirements validation through viewpoint resolution . . . . . . . . . . 1253--1269 N. H. Madhavji and W. Schafer Prism-methodology and process-oriented environment . . . . . . . . . . . . . . 1270--1283 G. K. Gill and C. F. Kemerer Cyclomatic complexity density and software maintenance productivity . . . 1284--1288 K. B. Lakshmanan and S. Jayaprakash and P. K. Sinha Properties of control-flow complexity measures . . . . . . . . . . . . . . . . 1289--1295
M. Satyanarayanan The influence of scale on distributed file system design . . . . . . . . . . . 1--9 D. Coleman and F. Hayes and S. Bear Introducing Objectcharts or how to use Statecharts in object-oriented design 8--18 E. A. T. Merks and J. M. Dyck and R. D. Cameron Language design for program manipulation 19--32 K. W. Miller and L. J. Morell and R. E. Noonan and S. K. Park and D. M. Nicol and B. W. Murrill and M. Voas Estimating the probability of failure when testing reveals no failures . . . . 33--43 S. D. Carson and S. Setia Analysis of the periodic update write policy for disk cache . . . . . . . . . 44--54 M. Granda and J. M. Drake and J. A. Gregorio Performance evaluation of parallel systems by using unbounded generalized stochastic Petri nets . . . . . . . . . 55--71 V. Grassi and L. Donatiello and S. Tucci On the optimal checkpointing of critical tasks and transaction-oriented systems 72--77 R. Ganesan and S. Weiss Scalar memory references in pipelined multiprocessors: a performance study . . 78--86
J. W. Davidson and A. M. Holler Subprogram inlining: a study of its effects on program execution time . . . 89--102 C. A. Waldspurger and T. Hogg and B. A. Huberman and J. O. Kephart and W. S. Stornetta Spawn: a distributed computational economy . . . . . . . . . . . . . . . . 103--117 P. S. Yu and D. M. Dias Analysis of hybrid concurrency control schemes for a high data contention environment . . . . . . . . . . . . . . 118--129 J. C. Laprie and K. Kanoun X-ware reliability and availability modeling . . . . . . . . . . . . . . . . 130--147 H. C. Lin and C. S. Raghavendra A dynamic load-balancing policy with a central job dispatcher (LBC) . . . . . . 148--158 G. Pucci A new approach to the modeling of recovery block structures . . . . . . . 159--167 B. J. Falkowski Comments on an optimal set of indices for a relational database . . . . . . . 168--171
D. Paulson and Y. Wand An automated approach to information systems decomposition . . . . . . . . . 174--189 H. E. Bal and M. Frans Kaashoek and Andrew S. Tanenbaum Orca: a language for parallel programming of distributed systems . . . 190--205 R. N. Taylor and D. L. Levine and C. D. Kelly Structural testing of concurrent programs . . . . . . . . . . . . . . . . 206--215 K. Y. Whang and A. Malhotra and G. H. Sockut and L. Burns and K. S. Choi Two-dimensional specification of universal quantification in a graphical database query language . . . . . . . . 216--224 H. Taylor A lingua franca for concurrent logic programming . . . . . . . . . . . . . . 225--236 Z. Ammarguellat A control-flow normalization algorithm and its complexity . . . . . . . . . . . 237--251 Y. E. Papelis and T. L. Casavant Specification and analysis of parallel/distributed software and systems by Petri nets with transition enabling functions . . . . . . . . . . . 252--261
J. Verner and G. Tate A software size model . . . . . . . . . 265--278 B. Fields and M. Elvang-Goransson A VDM case study in mural . . . . . . . 279--295 M. F. Pekergin Parallel computing optimization in the Apollo Domain network . . . . . . . . . 296--303 G. A. Venkatesh and C. N. Fischer SPARE: a development environment for program analysis algorithms . . . . . . 304--318 M. W. Mutka Estimating capacity for sharing in a privately owned workstation environment 319--328 R. B. France Semantically extended dataflow diagrams: a formal specification tool . . . . . . 329--346 P. S. Yu and M. S. Chen and H. U. Heiss and S. Lee On workload characterization of relational database environments . . . . 347--355
E. Steegmans and J. Lewi and I. van Horebeek Generation of interactive parsers with error handling . . . . . . . . . . . . . 357--367 A. P. Sinha and I. Vessey Cognitive fit: an empirical study of recursion and iteration . . . . . . . . 368--379 N. H. Madhavji Environment evolution: the Prism model of changes . . . . . . . . . . . . . . . 380--392 Q. Cui and J. Gannon Data-oriented exception handling . . . . 393--401 K. C. Kinsley and C. E. Hughes Analysis of a virtual memory model for maintaining database views . . . . . . . 402--409 N. F. Schneidewind Methodology for validating software metrics . . . . . . . . . . . . . . . . 410--422 J. C. Munson and T. M. Khoshgoftaar The detection of fault-prone programs 423--433 L. Kleinrock and J. H. Huang On parallel processing systems: Amdahl's law generalized and some results on optimal design . . . . . . . . . . . . . 434--447
C. Rich and Y. A. Feldman Seven layers of knowledge representation and reasoning in support of software development . . . . . . . . . . . . . . 451--469 S. Fickas and B. R. Helm Knowledge representation and reasoning in the design of composite systems . . . 470--482 J. Mylopoulos and L. Chung and B. Nixon Representing and using nonfunctional requirements: a process-oriented approach . . . . . . . . . . . . . . . . 483--497 B. Ramesh and V. Dhar Supporting systems development by capturing deliberations during requirements engineering . . . . . . . . 498--510 G. Fischer and A. Girgensohn and K. Nakakoji and D. Redmiles Supporting software designers with integrated domain-oriented design environments . . . . . . . . . . . . . . 511--522 D. E. Setliff and R. A. Rutenbar Knowledge representation and reasoning in a software synthesis architecture . . 523--533 F. Cacace and S. Ceri and L. Tanca and S. Crespi-Reghizzi Designing and prototyping data-intensive applications in the Logres and Algres programming environment . . . . . . . . 534--546
G. L. Heileman and M. Georgiopoulos and W. D. Roome A general framework for concurrent simulation on neural network models . . 551--562 N. Karunanithi and D. Whitley and Y. K. Malaiya Prediction of software reliability using connectionist models . . . . . . . . . . 563--574 E. Mesrobian and J. Skrzypek A software environment for studying computational neural systems . . . . . . 575--589 A. Stafylopatis and A. Likas Pictorial information retrieval using the random neural network . . . . . . . 590--600 L. S. Smith A framework for neural net specification 601--612 S. T. Kim and K. Suwunboriruksa and S. Herath and A. Jayasumana and J. Herath Algorithmic transformations for neural computing and performance of supervised learning on a dataflow machine . . . . . 613--623 M. Sahinoglu Compound-Poisson software reliability model . . . . . . . . . . . . . . . . . 624--630 K. Kato and T. Masuda Persistent Caching: An Implementation Technique for Complex Objects with Object Identity . . . . . . . . . . . . 631--645 G. S. Novak and F. N. Hill and M. L. Wan and B. G. Sayrs Negotiated interfaces for software reuse 646--653
J. E. B. Moss Working with persistent objects: to swizzle or not to swizzle . . . . . . . 657--673 Z. Manna and R. Waldinger Fundamentals of deductive program synthesis . . . . . . . . . . . . . . . 674--704 G. Nota and G. Pacini Querying of executable software specifications . . . . . . . . . . . . . 705--716 J. M. Voas PIE: a dynamic failure-based technique 717--727 D. Wang and B. Schurmann Computer aided analysis and derivation for artificial neural systems . . . . . 728--735 K. Schwan and H. Zhou Dynamic scheduling of hard real-time tasks and real-time threads . . . . . . 736--748 R. R. Lutz and J. S. K. Wong Detecting unsafe error recovery schedules . . . . . . . . . . . . . . . 749--760
R. Gerber and I. Lee A layered approach to automating the verification of real-time systems . . . 768--784 N. Halbwachs and F. Lagnier and C. Ratel Programming and verifying real-time systems by means of the synchronous data-flow language LUSTRE . . . . . . . 785--793 X. Nicollin and J. Sifakis and S. Yovine Compiling real-time specifications into extended automata . . . . . . . . . . . 794--804 A. C. Shaw Communicating real-time state machines 805--816 B. P. Mahony and I. J. Hayes A case-study in timed refinement: a mine pump . . . . . . . . . . . . . . . . . . 817--826 I. Greif and A. Seliger and W. Weihl A case study of CES: a distributed collaborative editing system implemented in Argus . . . . . . . . . . . . . . . . 827--839 L. Mark and R. J. Cochrane Grammars and relations . . . . . . . . . 840--849
W. L. Johnson and M. S. Feather and D. R. Harris Representation and presentation of requirements knowledge . . . . . . . . . 853--869 W. Mark and S. Tyler and J. McGuire and J. Schlossberg Commitment-based software development 870--885 M. Oivo and V. R. Basili Representing software engineering models: the TAME goal oriented approach 886--898 B. Ciciani and D. M. Dias and P. S. Yu Analysis of concurrency-coherency control protocols for distributed transaction processing systems with regional locality . . . . . . . . . . . 899--914 T. Mukhopadhyay and S. Kekre Software effort models for early estimation of process control applications . . . . . . . . . . . . . . 915--924
L. C. Briand and V. R. Basili and W. M. Thomas A pattern recognition approach for software engineering data analysis . . . 931--942 R. Chillarege and I. S. Bhandari and J. K. Chaar and M. J. Halliday and D. S. Moebus and B. K. Ray and M. Y. Wong Orthogonal defect classification --- a concept for in-process measurements . . 943--956 S. C. Eick and J. L. Steffen and E. E. Sumner Seesoft --- a tool for visualizing line oriented software statistics . . . . . . 957--968 Y. Liao and D. Cohen A specificational approach to high level program monitoring and measuring . . . . 969--978 T. M. Khoshgoftaar and J. C. Munson and B. B. Bhattacharya and G. D. Richardson Predictive modeling techniques of software quality from software measures 979--987 W. W. Agresti and W. M. Evanco Projecting software defects from analyzing Ada designs . . . . . . . . . 988--997 M. K. Daskalantonakis A practical view of software measurement and implementation experiences within Motorola . . . . . . . . . . . . . . . . 998--1010 C. F. Kemerer and B. S. Porter Improving the reliability of function point measurement: an empirical study 1011--1024 W. Harrison An entropy-based measure of software complexity . . . . . . . . . . . . . . . 1025--1029 C. Ebert Correspondence visualization techniques for analyzing and evaluating software measures . . . . . . . . . . . . . . . . 1029--1034
V. Rajlich Guest Editor's introduction: special issue on software maintenance . . . . . 1037--1037 N. Wilde and R. Huitt Maintenance support for object-oriented programs . . . . . . . . . . . . . . . . 1038--1044 M. Lejter and S. Meyers and S. P. Reiss Support for maintaining object-oriented programs . . . . . . . . . . . . . . . . 1045--1052 G. Canfora and A. Cimitile and U. de Carlini A logic-based approach to reverse engineering tools production . . . . . . 1053--1064 W. Kozaczynski and J. Ning and A. Engberts Program concept recognition and transformation . . . . . . . . . . . . . 1065--1075 J. J. P. Tsai and T. Weigert and H. C. Jang A hybrid knowledge representation as a basis of requirement specification and specification analysis . . . . . . . . . 1076--1100
R. W. Butler and G. B. Finelli The infeasibility of quantifying the reliability of life-critical real-time software . . . . . . . . . . . . . . . . 3--12 J. M. Rushby and F. von Henke Formal verification of algorithms for critical systems . . . . . . . . . . . . 13--23 J. M. Atlee and J. Gannon State-based model checking of event-driven system requirements . . . . 24--40 A. P. Ravn and H. Rischel and K. M. Hansen Specifying and verifying requirements of real-time systems . . . . . . . . . . . 41--55 R. Kurki-Suonio Stepwise design of real-time systems . . 56--69 J. Xu and D. L. Parnas On satisfying timing constraints in hard-real-time systems . . . . . . . . . 70--84
G. Chiola and M. A. Marsan and G. Balbo and G. Conte Generalized stochastic Petri nets: a definition at the net level and its implications . . . . . . . . . . . . . . 89--107 Y. Huang and S. K. Tripathi Resource allocation for primary-site fault-tolerant systems . . . . . . . . . 108--119 A. Delis and N. Roussopoulos Performance comparison of three modern DBMS architectures . . . . . . . . . . . 120--138 J. Xu Multiprocessor scheduling of processes with release times, deadlines, precedence, and exclusion relations . . 139--154 K. L. Wu and W. K. Fuchs Rapid transaction-undo recovery using twin-page storage management . . . . . . 155--164 G. Richter and B. Maffeo Toward a rigorous interpretation of ESML-extended systems modeling language 165--180 P. V. Rangan Trust requirements and performance of a fast subtransport-level protocol for secure communication . . . . . . . . . . 181--186 A. K. Agrawala and B. N. Jain Deterministic model and transient analysis of virtual circuits . . . . . . 187--197 M. Young and D. L. Levine and R. N. Taylor Comments on ``Temporal logic-based deadlock analysis for Ada'' by G. M. Karam and R. J. A. Burh . . . . . . . . 198--199 M. K. Daskalantonakis Correction to ``A practical view of software measurement and implementation experiences within Motorola'' . . . . . 199--200
P. G. Frankl and E. J. Weyuker A formal analysis of the fault-detecting ability of testing methods . . . . . . . 202--213 E. R. Gansner and E. Koutsofios and S. C. North and K. P. Vo A technique for drawing directed graphs 214--230 J. Micallef and G. E. Kaiser Support algorithms for incremental attribute evaluation of asynchronous subtree replacements . . . . . . . . . . 231--252 D. T. Peng and K. G. Shin Optimal scheduling of cooperative tasks in a distributed system using an enumerative method . . . . . . . . . . . 253--267 J. Plaice and W. W. Wadge A new approach to version control . . . 268--276 G. C. Roma and R. F. Gamble and W. E. Ball Formal derivation of rule-based programs 277--296 J. P. Ukelson and J. D. Gould and S. J. Boies User navigation in computer applications 297--306 N. Y. Foo Comments on ``Defining software by continuous smooth functions'' by R. A. De Millo and R. J. Lipton . . . . . . . 307--309 J. Xu and D. L. Parnas Correction to `On satisfying timing constraints in hard-real-time systems' by J. Xu and D. L. Parnas . . . . . . . 310
K. J. Lieberherr and C. Xiao Object-oriented software evolution . . . 313--343 C. Batini and G. Di Battista and G. Santucci Structuring primitives for a dictionary of entity relationship data schemas . . 344--365 T. Camp and P. Kearns and M. Ahuja Proof rules for flush channels . . . . . 366--378 R. D. Banker and R. J. Kauffman and D. Zweig Repository evaluation of software reuse 379--389 M. Y. M. Yen and R. W. Scamell A human factors experimental comparison of SQL and QBE . . . . . . . . . . . . . 390--409 L. Ness L.0: a truly concurrent executable temporal logic language for protocols 410--423
T. Miyoshi and M. Azuma An empirical study of evaluating software development environment quality 425--435 V. Berzins and Luqi and A. Yehudai Using transformations in specification-based prototyping . . . . 436--452 B. Kramer and Luqi and V. Berzins Compositional semantics of a real-time prototyping language . . . . . . . . . . 453--477 R. E. Strom and D. M. Yellin Extending typestate checking using conditional liveness analysis . . . . . 478--485 G. Iazeolla and F. Marinuzzi LISPACK --- a methodology and tool for the performance analysis of parallel systems and algorithms . . . . . . . . . 486--502 M. G. Staskauskas Formal derivation of concurrent programs: an example from industry . . . 503--528 D. R. Jeffery and G. C. Low and M. Barnes A comparison of function point counting techniques . . . . . . . . . . . . . . . 529--532
D. J. Richardson and M. C. Thompson An analysis of test data selection criteria using the RELAY model of fault detection . . . . . . . . . . . . . . . 533--553 E. V. Sorensen and J. Nordahl and N. H. Hansen From CSP models to Markov models . . . . 554--570 P. Ramanathan and K. G. Shin Use of common time base for checkpointing and rollback recovery in a distributed system . . . . . . . . . . . 571--583 M. J. Harrold and B. Malloy A unified interprocedural program representation for a maintenance environment . . . . . . . . . . . . . . 584--593 N. R. Adam and R. Tewari Regeneration with virtual copies for distributed computing systems . . . . . 594--602 T. K. Abdel-Hamid and K. Sengupta and D. Ronan Software project control: an experimental investigation of judgment with fallible information . . . . . . . 603--612 H. C. Rao and L. L. Peterson Accessing files in an Internet: the Jade file system . . . . . . . . . . . . . . 613--624 A. Kay and J. N. Reed A rely and guarantee method for timed CSP: a specification and design of a telephone exchange . . . . . . . . . . . 625--639 G. Canfora and A. Cimitile and U. de Carlini Correction to ``A logic-based approach to reverse engineering tools production (Dec 92 1053--1064) . . . . . . . . . . 640 M. R. Girgis Corrigendum for ``Constraint-based automatic test data generation'' by R. A. DeMillo and A. J. Offutt . . . . . . 640
F. Grandi and M. R. Scalas Block access estimation for clustered data using a finite LRU buffer . . . . . 641--660 R. Rask and P. Laamanen and K. Lyyttinen Simulation and comparison of Albrecht's function point and DeMarco's function bang metrics in a CASE environment . . . 661--671 J. Biswas and J. C. Browne Data structures for parallel resource management . . . . . . . . . . . . . . . 672--686 M. Z. Tsoukalas and J. W. Duran and S. C. Ntafos On some reliability estimation problems in random and partition testing . . . . 687--697 S. Rangarajan and P. Jalote and S. K. Tripathi Capacity of voting systems . . . . . . . 698--706 A. Sears Layout appropriateness: a metric for evaluating user interface widget layout 707--719 C. U. Smith and L. G. Williams Software performance engineering: a case study including performance comparison with design alternatives . . . . . . . . 720--741 A. S. Parrish and S. H. Zweben Clarifying some fundamental concepts in software testing . . . . . . . . . . . . 742--746
G. Graefe and D. L. Davison Encapsulation of parallelism and architecture-independence in extensible database query execution . . . . . . . . 749--764 T. Nakajo and I. Azuma and M. Tada A case history development of a foolproofing interface documentation system . . . . . . . . . . . . . . . . . 765--773 P. G. Frankl and S. N. Weiss An experimental comparison of the effectiveness of branch testing and data flow testing . . . . . . . . . . . . . . 774--787 B. Hamidzadeh and S. Shekhar Specification and analysis of real-time problem solvers . . . . . . . . . . . . 788--803 W. W. Chu and I. T. Ieong A transaction-based approach to vertical partitioning for relational database systems . . . . . . . . . . . . . . . . 804--812 J. L. Hellerstein Achieving service rate objectives with decay usage scheduling . . . . . . . . . 813--825 R. Govindarajan Exception handlers in functional programming languages . . . . . . . . . 826--834 P. Di Felice Reusability of mathematical software: a contribution . . . . . . . . . . . . . . 835--843
M. Ahuja and T. Carlson and A. Gahlot Passive-space and time view: vector clocks for achieving higher performance, program correction, and distributed computing . . . . . . . . . . . . . . . 845--855 D. L. Parnas Predicate logic for software engineering 856--862 A. M. K. Cheng and J. C. Browne and A. K. Mok and Rwo-Hsi Wang Analysis of real-time rule-based systems with behavioral constraint assertions specified in Estella . . . . . . . . . . 863--885 P. Helman and G. Liepins Statistical foundations of audit trail analysis for the detection of computer misuse . . . . . . . . . . . . . . . . . 886--901 Ing-Ray Chen and S. A. Banawan Modeling and analysis of concurrent maintenance policies for data structures using pointers . . . . . . . . . . . . . 902--911 E. J. Weyuker More experience with data flow testing 912--919 D. I. Katcher and H. Arakawa and J. K. Strosnider Engineering and analysis of fixed priority schedulers . . . . . . . . . . 920--934 J. J. Shilling Incremental LL(1) parsing in language-based editors . . . . . . . . . 935--940
J. A. Solheim and J. H. Rowland An empirical study of testing and integration strategies using artificial software systems . . . . . . . . . . . . 941--949 L. F. Cabrera and J. A. McPherson and P. M. Schwarz and J. C. Wyllie Implementing atomicity in two systems: techniques, tradeoffs, and experience 950--961 P. G. Frankl and E. J. Weyuker Provable improvements on branch testing 962--975 Bin Qin Meet real-time requirements of parallel programs and maximally utilize system resources . . . . . . . . . . . . . . . 976--981 P. S. Yu and D. M. Dias Performance analysis of concurrency control using locking with deferred blocking . . . . . . . . . . . . . . . . 982--996 A. Del Bimbo and M. Campanai and P. Nesi A three-dimensional iconic environment for image database querying . . . . . . 997--1011
A. Arora and M. Gouda Closure and convergence: a foundation of fault-tolerant computing . . . . . . . . 1015--1027 L. C. Briand and V. R. Brasili and C. J. Hetmanski Developing interpretable models with optimized set reduction for identifying high-risk software components . . . . . 1028--1044 S. A. Vander Wiel and L. G. Votta Assessing software designs using capture-recapture methods . . . . . . . 1045--1054 J. K. Chaar and M. J. Halliday and I. S. Bhandari and R. Chillarege In-process evaluation for software inspection and test . . . . . . . . . . 1055--1070 L. A. Tomek and J. K. Muppala and K. S. Trivedi Modeling correlation in software recovery blocks . . . . . . . . . . . . 1071--1086 Y. K. Malaiya and A. von Mayrhauser and P. K. Srimani An examination of fault exposure ratio 1087--1094 N. F. Schneidewind Software reliability model with optimal selection of failure data . . . . . . . 1095--1104 W. I. Kao and R. K. Iyer and D. Tang FINE: A fault injection and monitoring environment for tracing the UNIX system behavior under faults . . . . . . . . . 1105--1118 O. Berman and N. Ashrafi Optimization models for reliability of modular software systems . . . . . . . . 1119--1123
S. C. Bandinelli and A. Fuggetta and C. Ghezzi Software process model evolution in the SPADE environment . . . . . . . . . . . 1128--1144 M. L. Jaccheri and R. Conradi Techniques for process model evolution in EPOS . . . . . . . . . . . . . . . . 1145--1156 I. Bhandari and M. Halliday and E. Tarver and D. Brown and J. Chaar and R. Chillarege A case study of software process improvement during development . . . . . 1157--1170 Wei Kuan Shih and J. W. S. Liu and C. L. Liu Modified rate-monotonic algorithm for scheduling periodic jobs with deferred deadlines . . . . . . . . . . . . . . . 1171--1179
P. B. Danzig Flow control for limited buffer multicast . . . . . . . . . . . . . . . 1--12 M. G. Harbour and M. H. Klein and J. P. Lehoczky Timing analysis for fixed-priority scheduling of hard real-time systems . . 13--28 T. Higashino and G. v. Bochmann Automatic analysis and test case derivation for a restricted class of LOTOS expressions with data parameters 29--42 A. D. Kshemkalyani and M. Singhal Efficient detection and resolution of generalized distributed deadlocks . . . 43--54 S. S. Lam and A. U. Shankar A theory of interfaces and modules $I$-composition theorem . . . . . . . . 55--71 G. Luo and A. Das and G. v. Bochmann Software testing based on SDL specifications with save . . . . . . . . 72--87 M. D. Rice and S. B. Seidman A formal model for module interconnection languages . . . . . . . 88--101
Jong-Deok Choi and R. Cytron and J. Ferrante On the efficient engineering of ambitious program analysis . . . . . . . 105--114 Jianan Li and I. Suzuki and M. Yamashita A new structural induction theorem for rings of temporal Petri nets . . . . . . 115--126 M. Felder and D. Mandrioli and A. Morzenti Proving properties of real-time systems through logical specifications and Petri net models . . . . . . . . . . . . . . . 127--141 P. E. Ammann and S. S. Brilliant and J. C. Knight The effect of imperfect error detection on reliability assessment via life testing . . . . . . . . . . . . . . . . 142--148 Gang Luo and G. von Bochmann and A. Petrenko Test selection based on communicating nondeterministic finite-state machines using a generalized Wp-method . . . . . 149--162
R. D. Banker and R. J. Kauffman and C. Wright and D. Zweig Automating output size and reuse metrics in a repository-based computer-aided software engineering (CASE) environment 169--187 Yen-Min Huang and C. V. Ravishankar Designing an agent synthesis system for cross-RPC communication . . . . . . . . 188--198 N. Fenton Software measurement: a necessary scientific basis . . . . . . . . . . . . 199--206 F. Lustman Specifying transaction-based information systems with regular expressions . . . . 207--217 W. G. Griswold Comments on ``Language design for program manipulation'' . . . . . . . . . 218--219
R. L. Bagrodia and Wen-Toh Liao Maisie: a language for the design of efficient discrete-event simulations . . 225--238 G. C. Roman and C. D. Wilcox Architecture-directed refinement . . . . 239--258 S. Antoy and J. Gannon Using term rewriting to verify software 259--274 J. E. Matson and B. E. Barrett and J. M. Mellichamp Software development cost estimation using function points . . . . . . . . . 275--287 G. W. Ernst and R. J. Hookway and W. F. Ogden Modular verification of data abstractions with shared realizations 288--307 S. Vestal Fixed-priority sensitivity analysis for linear compute time models . . . . . . . 308--317 S. R. Dalal and A. A. McIntosh When to stop testing for large software systems with changing code . . . . . . . 318--323
M. Notomi and T. Murata Hierarchical reachability graph of bounded Petri nets for concurrent-software analysis . . . . . . 325--336 A. J. Offutt and S. D. Lee An empirical evaluation of weak mutation 337--344 N. Lopez-Benitez Dependability modeling and analysis of distributed programs . . . . . . . . . . 345--352 E. Weyuker and T. Goradia and A. Singh Automatically generating test data from a Boolean specification . . . . . . . . 353--363 Xiping Song and L. J. Osterweil Experience with an approach to comparing software design methodologies . . . . . 364--384 H. D. Pande and W. A. Landi and B. G. Ryder Interprocedural def-use associations for C systems with single level pointers . . 385--403
V. Akella and G. Gopalakrishnan Specification and validation of control-intensive IC's in hopCP . . . . 405--423 N. R. Saxena and E. J. McCluskey Linear complexity assertions for sorting 424--431 P. Krueger and N. G. Shivaratri Adaptive location policies for global scheduling . . . . . . . . . . . . . . . 432--444 W. E. Howden and B. Wieand QDA --- a method for systematic informal program analysis . . . . . . . . . . . . 445--462 S. Paul and A. Prakash A framework for source code search using program patterns . . . . . . . . . . . . 463--475 S. R. Chidamber and C. F. Kemerer A metrics suite for object oriented design . . . . . . . . . . . . . . . . . 476--493 C. Wohlin and P. Runeson Certification of software components . . 494--499 M. Flatebo and A. K. Datta Two-state self-stabilizing algorithms for token rings . . . . . . . . . . . . 500--504
G. Ciardo and R. German and C. Lindemann A characterization of the stochastic process underlying a stochastic Petri net . . . . . . . . . . . . . . . . . . 506--515 G. Franceschinis and R. R. Muntz Computing bounds for the performance indices of quasi-lumpable stochastic well-formed nets . . . . . . . . . . . . 516--525 J. Campos and J. M. Colom and H. Jungnitz and M. Silva Approximate throughput computation of stochastic marked graphs . . . . . . . . 526--535 R. J. Boucherie A characterization of independence for competing Markov chains with applications to stochastic Petri nets 536--544
A. Coen-Porisini and R. A. Kemmerer and D. Mandrioli A formal framework for ASTRAL intralevel proof obligations . . . . . . . . . . . 548--561 D. W. Bustard and A. C. Winstanley Making changes to formal specifications: requirements and an example . . . . . . 562--568 A. C. W. Finkelstein and D. Gabbay and A. Hunter and J. Kramer and B. Nuseibeh Inconsistency handling in multiperspective specifications . . . . 569--578 Shing Chi Cheung and J. Kramer Tractable dataflow analysis for distributed systems . . . . . . . . . . 579--593 A. Aue and M. Breu Distributed information systems: an advanced methodology . . . . . . . . . . 594--605 F. De Paoli and F. Tisato CSDL: a language for cooperative systems design . . . . . . . . . . . . . . . . . 606--616 W. B. Frakes and T. P. Pole An empirical study of representation methods for reusable software components 617--630 B. W. Weide and S. H. Edwards and D. E. Harms and D. A. Lamb Design and specification of iterators using the swapping paradigm . . . . . . 631--643 J. M. Bieman and L. M. Ott Measuring functional cohesion . . . . . 644--657 Ing-Ray Chen and F. B. Bastani Warm standby in hierarchically structured process-control programs . . 658--663 S. Stoller Addendum to ``Proof rules for flush channels'' . . . . . . . . . . . . . . . 664
S. Weerahandi and R. E. Hausman Software quality measurement based on fault-detection data . . . . . . . . . . 665--676 S. Campodonico and N. D. Singpurwalla A Bayesian analysis of the logarithmic--Poisson execution time model based on expert opinion and failure data . . . . . . . . . . . . . . 677--683 N. G. Leveson and M. P. E. Heimdahl and H. Hildreth and J. D. Reese Requirements specification for process-control systems . . . . . . . . 684--707 G. S. Avrunin and J. C. Corbett and L. K. Dillon and J. C. Wileden Automated derivation of time bounds in uniprocessor concurrent systems . . . . 708--719 M. Tucci and G. Vitiello and G. Costagliola Parsing nonlinear languages . . . . . . 720--739 K. Kanoun and J. C. Laprie Software reliability trend analyses from theoretical to practical considerations 740--747
Yabo Wang and D. L. Parnas Simulating the behavior of software modules by trace rewriting . . . . . . . 750--759 B. Nuseibeh and J. Kramer and A. Finkelstein A framework for expressing the relationships between multiple views in requirements specification . . . . . . . 760--773 M. G. Bradac and D. E. Perry and L. G. Votta Prototyping a process monitoring experiment . . . . . . . . . . . . . . . 774--784 L. Hatton and A. Roberts How accurate is scientific software? . . 785--797 D. L. Kiskis and K. G. Shin SWSL: a synthetic workload specification language for real-time systems . . . . . 798--811 J. A. Whittaker and M. G. Thomason A Markov chain model for statistical software testing . . . . . . . . . . . . 812--824
H. Lichter and M. Schneider-Hufschmidt and H. Zullighoven Prototyping in industrial software projects-bridging the gap between theory and practice . . . . . . . . . . . . . . 825--832 H. Wohlwend and S. Rosenbaum Schlumberger's software improvement program . . . . . . . . . . . . . . . . 833--839 H. H. Deubler and M. Koestler Introducing object orientation into large and complex systems . . . . . . . 840--848 S. Honiden and K. Nishimura and N. Uchihira and K. Itoh An application of artificial intelligence to object-oriented performance design for real-time systems 849--867 D. A. Menasce and Y. Yesha and K. Kalpakis On a unified framework for the evaluation of distributed quorum attainment protocols . . . . . . . . . . 868--884
A. Bertolino and M. Marre Automatic generation of path covers based on the control flow analysis of computer programs . . . . . . . . . . . 885--899 M. Diaz and G. Juanole and J. P. Courtiat Observer --- a concept for formal on-line validation of distributed systems . . . . . . . . . . . . . . . . 900--913 Ying Liu and A. K. Singh and R. L. Bagrodia A decompositional approach to the design of parallel programs . . . . . . . . . . 914--932 F. Jahanian and A. K. Mok Modechart: a specification language for real-time systems . . . . . . . . . . . 933--947 D. Lorge Parnas and J. Madey and M. Iglewski Precise documentation of well-structured programs . . . . . . . . . . . . . . . . 948--976 T. Y. Chen and Y. T. Yu On the relationship between partition and random testing . . . . . . . . . . . 977--980
P. Triantafillou and D. J. Taylor The location-based paradigm for replication: Achieving efficiency and availability in distributed systems . . 1--18 D. S. Rosenblum A practical approach to programming with assertions . . . . . . . . . . . . . . . 19--31 J. J. P. Tsai and S. Jennhwa Yang and Yao-Hsiung Chang Timing constraint Petri nets and their application to schedulability analysis of real-time system specifications . . . 32--49 S. Hariri and H. Mutlu Hierarchical modeling of availability in distributed systems . . . . . . . . . . 50--56
A. Boswell Specification and validation of a security policy model . . . . . . . . . 63--68 G. Barrett Model checking in practice: the T9000 virtual channel processor . . . . . . . 69--78 J. Bicarregui and B. Ritchie Invariants, frames and postconditions: a comparison of the VDM and B notations 79--89 D. Craigen and S. Gerhart and T. Ralston Formal methods reality check: industrial usage . . . . . . . . . . . . . . . . . 90--98 J. Jacky Specifying a safety-critical control system in Z . . . . . . . . . . . . . . 99--106 S. Owre and J. Rushby and N. Shankar and F. von Henke Formal verification for fault-tolerant architectures: prolegomena to the design of PVS . . . . . . . . . . . . . . . . . 107--125 K. Srinivasan and D. Fisher Machine learning approaches to estimating software development effort 126--137 K. Osterbye Literate Smalltalk programming using hypertext . . . . . . . . . . . . . . . 138--145 R. G. Dromey A model for software product quality . . 146--162 S. Venkatesan and B. Dathan Testing and debugging distributed programs using global predicates . . . . 163--177
K. Ilgun and R. A. Kemmerer and P. A. Porras State transition analysis: a rule-based intrusion detection approach . . . . . . 181--199 S. H. Zweben and S. H. Edwards and B. W. Weide and J. E. Hollingsworth The effects of layering and encapsulation on software development cost and quality . . . . . . . . . . . . 200--208 T. Johnson Approximate analysis of reader/writer queues . . . . . . . . . . . . . . . . . 209--218 W. J. Gutjahr Optimal test distributions for software failure cost estimation . . . . . . . . 219--228 D. D. Cowan and C. J. P. Lucena Abstract data views: an interface specification concept to enhance design for reuse . . . . . . . . . . . . . . . 229--243 S. Vranes and M. Stanojevic Integrating multiple paradigms within the blackboard framework . . . . . . . . 244--262 N. I. Churcher and M. J. Shepperd and S. Chidamber and C. F. Kemerer Comments on ``A metrics suite for object oriented design'' . . . . . . . . . . . 263--265
W. G. Griswold and D. Notkin Architectural tradeoffs for a meaning-preserving program restructuring tool . . . . . . . . . . . . . . . . . . 275--287 B. Hayes-Roth and K. Pfleger and P. Lalanda and P. Morignot and M. Balabanovic A domain-specific software architecture for adaptive intelligent systems . . . . 288--301 T. R. Dean and J. R. Cordy A syntactic theory of software architecture . . . . . . . . . . . . . . 302--313 Mary Shaw and Robert DeLine and Daniel V. Klein and Theodore L. Ross and David M. Young and Gregory Zelesnik Abstractions for software architecture and tools to support them . . . . . . . 314--335 D. C. Luckham and J. J. Kenney and L. M. Augustin and J. Vera and D. Bryan and W. Mann Specification and analysis of system architecture using Rapide . . . . . . . 336--354 M. Moriconi and X. Qian and R. A. Riemenschneider Correct architecture refinement . . . . 356--372 P. Inverardi and A. L. Wolf Formal specification and analysis of software architectures using the chemical abstract machine model . . . . 373--386
R. Gerber and Seongsoo Hong Compiling real-time programs with timing constraint refinement and structural code motion . . . . . . . . . . . . . . 389--404 J. Tian and Peng Lu and J. Palma Test-execution-based reliability measurement and modeling for large commercial software . . . . . . . . . . 405--414 F. Ng and G. Butler and Judy Kay An intelligent tutoring system for the Dijkstra--Gries methodology . . . . . . 415--428 S. Dolev and A. Israeli and S. Moran Analyzing expected time by scheduler-luck games . . . . . . . . . . 429--439 S. Bandinelli and A. Fuggetta and L. Lavazza and M. Loi and G. P. Picco Modeling and improving an industrial software process . . . . . . . . . . . . 440--454 Inhwan Lee and R. K. Iyer Software dependability in the Tandem GUARDIAN system . . . . . . . . . . . . 455--467 M. G. Sriram and M. Singhal Measures of the potential for load sharing in distributed computing systems 468--475 A. Burns and K. Tindell and A. Wellings Effective analysis for engineering real-time fixed priority schedulers . . 475--480
R. J. Hall Call path refinement profiles . . . . . 481--496 M. Spezialetti and R. Gupta Loop monotonic statements . . . . . . . 497--505 A. M. Stavely Verifying definite iteration over data structures . . . . . . . . . . . . . . . 506--514 T. Kunz and J. P. Black Using automatic process clustering for design recovery and distributed debugging . . . . . . . . . . . . . . . 515--527 H. Mili and F. Mili and A. Mili Reusing software: issues and research directions . . . . . . . . . . . . . . . 528--562 A. A. Porter and L. G. Votta and V. R. Basili Comparing detection methods for software requirements inspections: a replicated experiment . . . . . . . . . . . . . . . 563--575
R. Gerber and Seongsoo Hong and M. Saksena Guaranteeing real-time requirements with resource-based calibration of periodic processes . . . . . . . . . . . . . . . 579--592 Sung-Soo Lim and Young Hyun Bae and Gyu Tae Jang and Byung-Do Rhee and Sang Lyul Min and Chang Yun Park and Heonshik Shin and Kunsoo Park and Soo-Mook Moon and Chong Sang Kim An accurate worst case timing analysis for RISC processors . . . . . . . . . . 593--604 Rwo-Hsi Wang and A. K. Mok Response-time bounds of EQL rule-based programs under rule priority structure 605--614 R. H. Saavedra and A. J. Smith Performance characterization of optimizing compilers . . . . . . . . . . 615--628 A. M. Tyrrell and G. F. Carpenter CSP methods for identifying atomic actions in the design of fault tolerant concurrent systems . . . . . . . . . . . 629--639
J. Tian and M. V. Zelkowitz Complexity measure evaluation and selection . . . . . . . . . . . . . . . 641--650 G. S. Novak Conversion of units of measurement . . . 651--661 P. Bertolazzi and G. Di Battista and G. Liotta Parametric graph drawing . . . . . . . . 662--673 M. Jorgensen Experience with the accuracy of software maintenance task effort prediction models . . . . . . . . . . . . . . . . . 674--681 H. Levy and R. J. T. Morris Exact analysis of Bernoulli superposition of streams into a least recently used cache . . . . . . . . . . 682--688 J. A. Rolia and K. C. Sevcik The Method of Layers . . . . . . . . . . 689--700 H. Sarper No special schemes are needed for solving software reliability optimization models . . . . . . . . . . 701--702
A. Avritzer and E. R. Weyuker The automatic generation of load test suites and the assessment of the resulting software . . . . . . . . . . . 705--716 D. C. Luckham and J. Vera An event-based architecture definition language . . . . . . . . . . . . . . . . 717--734 K. J. Goldman and B. Swaminathan and P. McCartney and M. D. Anderson and R. Sethuraman The Programmers' Playground: I/O abstraction for user-configurable distributed applications . . . . . . . . 735--746 J. H. R. May and A. D. Lunn A model of code sharing for estimating software failure on demand probabilities 747--753 C. M. Woodside A three-view model for performance engineering of concurrent software . . . 754--767 L. Lamport TLA in pictures . . . . . . . . . . . . 768--775 J. E. Neilson and C. M. Woodside and D. C. Petriu and S. Majumdar Software bottlenecking in client-server systems and rendezvous networks . . . . 776--782
A. Borgida and J. Mylopoulos and R. Reiter On the frame problem in procedure specifications . . . . . . . . . . . . . 785--798 R. H. Bourdeau and B. H. C. Cheng A formal semantics for object model diagrams . . . . . . . . . . . . . . . . 799--821 M. Aagaard and M. Leeser Verifying a logic-synthesis algorithm and implementation: a case study in software verification . . . . . . . . . 822--833 V. B. Lortz and K. G. Shin Semaphore queue priority assignment for real-time multiprocessor synchronization 834--844 B. Krishnamurthy and D. S. Rosenblum Yeast: a general purpose event-action system . . . . . . . . . . . . . . . . . 845--857 R. A. DeMillo and A. P. Mathur and W. E. Wong and P. G. Frankl and E. J. Weyuker Some critical remarks on a hierarchy of fault-detecting abilities of test methods [and reply] . . . . . . . . . . 858--863
S. Cavalieri and A. Di Stefano and O. Mirabella Pre-run-time scheduling to reduce schedule length in the FieldBus environment . . . . . . . . . . . . . . 865--880 A. H. Lee and J. L. Zachary Reflections on metaprogramming . . . . . 883--893 D. A. Ladd and J. C. Ramming A*: a language for implementing language processors . . . . . . . . . . . . . . . 894--901 K. Yasumatsu and N. Doi SPiCE: a system for translating Smalltalk programs into a C environment 902--912 Yong-Fong Lee and B. G. Ryder and M. E. Fiuczynski Region analysis: a parallel elimination method for data flow analysis . . . . . 913--926
Anonymous 1995 Index \booktitleIEEE Transactions on Software Engineering Vol. 21 . . . . 1 B. Kitchenham and S. Lawrence Pfleeger and N. Fenton Towards a framework for software measurement validation . . . . . . . . . 929--944 J. Tian Integrating time domain and input domain analyses of software reliability using tree-based models . . . . . . . . . . . 945--958 Jia Liang Han Program partition and logic program analysis . . . . . . . . . . . . . . . . 959--968 G. Bucci and E. Vicario Compositional validation of time-critical systems using communicating time Petri nets . . . . . 969--992 G. S. Novak Creation of views for reuse of software with different data representations . . 993--1005 A. S. Parrish and S. H. Zweben On the relationships among the all-uses, all-DU-paths, and all-edges testing criteria . . . . . . . . . . . . . . . . 1006--1009 P. Devanbu On ``A framework for source code search using program patterns'' . . . . . . . . 1009--1010
J. McHugh Introduction to the Special Section . . 3 M. Abadi and R. Needham Prudent engineering practice for cryptographic protocols . . . . . . . . 6--15 N. Heintze and J. D. Tygar A model for secure protocols and their compositions . . . . . . . . . . . . . . 16--30 M. K. Reiter A secure group membership protocol . . . 31--42 Li Gong and Xiaolei Qian Computational issues in secure interoperation . . . . . . . . . . . . . 43--52 J. McLean A general theory of composition for a class of ``possibilistic'' properties 53--67 L. C. Briand and S. Morasca and V. R. Basili Property-based software engineering measurement . . . . . . . . . . . . . . 68--86
A. Bertolino and L. Strigini On the use of testability measures for dependability assessment . . . . . . . . 97--108 T. Y. Chen and Y. T. Yu On the expected number of failures detected by subdomain testing and random testing . . . . . . . . . . . . . . . . 109--119 D. Gupta and P. Jalote and G. Barua A formal framework for on-line software version change . . . . . . . . . . . . . 120--131 C. Clemencon and B. Mukherjee and K. Schwan Distributed shared abstractions (DSA) on multiprocessors . . . . . . . . . . . . 132--152 V. Rajlich and J. H. Silva Evolution and reuse of orthogonal architecture . . . . . . . . . . . . . . 153--157 K. Finney Mathematical notation in formal specification: too difficult for the masses? . . . . . . . . . . . . . . . . 158--159
J. C. Corbett Evaluating deadlock detection methods for concurrent software . . . . . . . . 161--180 R. Alur and T. A. Henzinger and Pei-Hsin Ho Automatic symbolic verification of embedded systems . . . . . . . . . . . . 181--201 S. Paul and A. Prakash A query algebra for program databases 202--217 Sanping Chen and S. Mills A binary Markov process model for random testing . . . . . . . . . . . . . . . . 218--223
C. D. Wilcox and G. C. Roman Reasoning about places, times, and actions in the presence of mobility . . 225--247 Hong Zhu A formal analysis of the subsume relation between software test adequacy criteria . . . . . . . . . . . . . . . . 248--255 F. Boussinot and R. de Simone The SL synchronous language . . . . . . 256--266 M. Hitz and B. Montazeri Chidamber and Kemerer's metrics suite: a measurement theory perspective . . . . . 267--271 Lin Lin Wang Thorough investigation into ``An improved algorithm based on subset closures for synthesizing a relational database scheme'' . . . . . . . . . . . 271--274 W. B. Frakes and C. J. Fox Quality improvement using a software reuse failure modes model . . . . . . . 274--279
C. Meadows Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 281 O. Sibert and P. A. Porras and R. Lindell An analysis of the Intel 80x86 security architecture and implementations . . . . 283--293 R. J. Anderson and S. J. Bezuidenhoudt On the reliability of electronic payment systems . . . . . . . . . . . . . . . . 294--301 M. K. Franklin and M. K. Reiter The design and implementation of a secure auction service . . . . . . . . . 302--312 R. Kailar Accountability in electronic commerce protocols . . . . . . . . . . . . . . . 313--328 M. H. Kang and I. S. Moskowitz and D. C. Lee A network pump . . . . . . . . . . . . . 329--338 S. K. Abd-El-Hafiz and V. R. Basili A knowledge-based approach to the analysis of loops . . . . . . . . . . . 339--360
D. Notkin and D. R. Jeffery Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 361 M. P. E. Heimdahl and N. G. Leveson Completeness and consistency in hierarchical state-based requirements 363--377 M. A. Ardis and J. A. Chaves and L. J. Jagadeesan and P. Mataga and C. Puchol and M. G. Staskauskas and J. Von Olnhausen A framework for evaluating specification methods for reactive systems-experience report . . . . . . . . . . . . . . . . . 378--389 R. N. Taylor and N. Medvidovic and K. M. Anderson and E. J. Whitehead and J. E. Robbins and K. A. Nies and P. Oreizy and D. L. Dubrow A component- and message-based architectural style for GUI software . . 390--406 T. Isakowitz and R. J. Kauffman Supporting search for reusable software objects . . . . . . . . . . . . . . . . 407--423 A. Von Mayrhauser and A. M. Vans Identification of dynamic comprehension processes during large scale maintenance 424--437
M. J. Harrold and G. Rothermel Separate computation of alias information for reuse . . . . . . . . . 442--460 J. C. Corbett Timing analysis of Ada tasking programs 461--483 D. Jackson and C. A. Damon Elements of style: analyzing a software design feature with a counterexample detector . . . . . . . . . . . . . . . . 484--495 P. Godefroid and D. Peled and M. Staskauskas Using partial-order methods in the formal validation of industrial concurrent programs . . . . . . . . . . 496--507 P. Zave and M. Jackson Where do operations come from? A multiparadigm specification technique 508--528
G. Rothermel and M. J. Harrold Analyzing regression test selection techniques . . . . . . . . . . . . . . . 529--551 Kuo-Chung Tai Theory of fault-based predicate testing for computer programs . . . . . . . . . 552--562 K. J. Sullivan and I. J. Kalet and D. Notkin Evaluating the mediator method: Prism as a case study . . . . . . . . . . . . . . 563--579 Taizan Chan and Siu Leung Chung and Teck Hua Ho An economic model to estimate software rewriting and replacement times . . . . 580--598 Anonymous Reference Model for Smooth Growth of Software Systems (003)5402022 . . . . .
G. Ciardo and C. Ghezzi Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 601 M. A. Qureshi and W. H. Sanders and A. P. A. van Moorsel and R. German Algorithms for the generation of state-level representations of stochastic activity networks with general reward structures . . . . . . . 603--614 P. Kemper Numerical analysis of superposed GSPNs 615--628 R. Gaeta Efficient discrete-event simulation of colored Petri nets . . . . . . . . . . . 629--639 V. Mainkar and K. S. Trivedi Sufficient conditions for existence of a fixed point in stochastic reward net-based iterative models . . . . . . . 640--653 M. Sereno Approximate mean value analysis for stochastic marked graphs . . . . . . . . 654--664 M. Ward Derivation of data intensive algorithms by formal transformation: the Schnorr--Waite graph marking algorithm 665--686 T. Adams Total variance approach to software reliability estimation . . . . . . . . . 687--688
E. Battiston and F. De Cindio and G. Mauri Modular algebraic nets to specify concurrent systems . . . . . . . . . . . 689--705 K. D. Maxwell and L. Van Wassenhove and S. Dutta Software development productivity of European space, military, and industrial applications . . . . . . . . . . . . . . 706--718 N. J. Puketza and K. Zhang and M. Chung and B. Mukherjee and R. A. Olsson A methodology for testing intrusion detection systems . . . . . . . . . . . 719--729 F. Ferrucci and G. Tortora and M. Tucci and G. Vitiello Semantics-based inference algorithms for adaptive visual environments . . . . . . 730--750 V. R. Basili and L. C. Briand and W. L. Melo A validation of object-oriented design metrics as quality indicators . . . . . 751--761 F. W. Burton Guaranteeing good memory bounds for parallel programs . . . . . . . . . . . 762--773
P. Stocks and D. Carrington A framework for specification-based testing . . . . . . . . . . . . . . . . 777--793 M. B. Dwyer and L. A. Clarke A compact Petri net representation and its implications for analysis . . . . . 794--811 P. Triantafillou Independent recovery in large-scale distributed systems . . . . . . . . . . 812--826 H. Levy and T. G. Messinger and R. J. T. Morris The cache assignment problem and its application to database buffer management . . . . . . . . . . . . . . . 827--838
S. Bandinelli and E. Di Nitto and A. Fuggetta Supporting cooperation in the SPADE-1 environment . . . . . . . . . . . . . . 841--865 Y. Chernak A statistical approach to the inspection checklist formal synthesis and improvement . . . . . . . . . . . . . . 866--874 J. D. Blackburn and G. D. Scudder and L. N. Van Wassenhove Improving speed and productivity of software development: a global survey of software developers . . . . . . . . . . 875--885 N. Ohlsson and H. Alberg Predicting fault-prone software modules in telephone switches . . . . . . . . . 886--894 A. Abran and P. N. Robillard Function points analysis: an empirical study of its measurement processes . . . 895--910 R. H. Bourdeau and B. H. C. Cheng Correspondence: Response to Botting's Comments . . . . . . . . . . . . . . . . 911--911 R. J. Botting and R. H. Bourdeau and B. H. C. Cheng Comments on ``A formal semantics for object model diagrams'' . . . . . . . . 911 Anonymous 1996 Index \booktitleIEEE Transactions on Software vol. 22 . . . . . . . . . . 912--919
Yong Yan and Xiaodong Zhang and Qian Ma Software support for multiprocessor latency measurement and evaluation . . . 4--16 B. Korel Computation of dynamic program slices for unstructured programs . . . . . . . 17--34 P. Triantafillou and C. Neilson Achieving strong consistency in a distributed file system . . . . . . . . 35--55 R. J. Hilderman and H. J. Hamilton A note on regeneration with virtual copies . . . . . . . . . . . . . . . . . 56--59 Anonymous Author index . . . . . . . . . . . . . . 60--61
Anonymous Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 65--66 D. Batory and B. J. Geraci Composition validation and subjectivity in GenVoca generators . . . . . . . . . 67--82 S. H. Edwards Representation inheritance: a safe form of ``White box'' code inheritance . . . 83--92 Wu-Chun Feng and J. W. S. Liu Algorithms for scheduling real-time tasks with input error and end-to-end deadlines . . . . . . . . . . . . . . . 93--106 A. Wellings and A. Burns Implementing atomic actions in Ada 95 107--123
A. A. Porter and P. M. Johnson Assessing software review meetings: results of a comparative analysis of two experimental studies . . . . . . . . . . 129--145 D. S. Rosenblum and E. J. Weyuker Using coverage information to predict the cost-effectiveness of regression testing strategies . . . . . . . . . . . 146--156 M. Sitaraman and B. W. Weide and W. F. Ogden On the practical need for abstraction relations to verify abstract data type representations . . . . . . . . . . . . 157--170 Jen-Yen Jason Chen CSPL: an Ada95-like, Unix-based process environment . . . . . . . . . . . . . . 171--184 M. Abadi Explicit communication revisited: two new attacks on authentication protocols 185--186 S. Morasca and L. C. Briand and V. R. Basili and E. J. Weyuker and M. V. Zelkowitz and B. Kitchenham and S. Lawrence Pfleeger and N. Fenton Comments on ``Towards a framework for software measurement validation'' . . . 187--189 B. Kitchenham and S. Lawrence Pfleeger and N. Fenton Reply To: Comments On ``Towards a Framework of Software Measurement Validation'' . . . . . . . . . . . . . . 189--189 G. Poels and G. Dedene and L. C. Briand and S. Morasca and V. R. Basili Comments on ``Property-based software engineering measurement: refining the additivity properties'' . . . . . . . . 190--197 L. C. Briand and S. Morasca and V. R. Basili Response To: Comments On ``Property-based Software Engineering Measurement: Refining The Additivity Properties'' . . . . . . . . . . . . . . 196--197
S. R. Faulk and C. Heitmeyer Introduction to the Special Section . . 201--202 M. Kaufmann and J. S. Moore An industrial strength theorem prover for a logic based on Common Lisp . . . . 203--213 W. D. Young Comparing verification systems: interactive consistency in ACL2 . . . . 214--223 B. Bloom and A. Cheng and A. Dsouza Using a Protean language to enhance expressiveness in specification . . . . 224--234 E. Jonsson and T. Olovsson A quantitative model of the security intrusion process based on attacker behavior . . . . . . . . . . . . . . . . 235--245 F. Lanubile and G. Visaggio Extracting reusable functions by flow graph based program slicing . . . . . . 246--259 B. Henderson-Sellers Corrigenda: ``Software size estimation of object-oriented systems'' . . . . . . 260--261
L. K. Dillon and S. Sankar Introduction to the special issue . . . 265--266 B. Dutertre and V. Stavridou Formal requirements analysis of an avionics control system . . . . . . . . 267--278 G. J. Holzmann The model checker SPIN . . . . . . . . . 279--295 S. Matsuura and H. Kuruma and S. Honiden EVA: a flexible programming method for evolving systems . . . . . . . . . . . . 296--313 Changqing Wang and D. R. Musser Dynamic verification of C++ generic algorithms . . . . . . . . . . . . . . . 314--323
A. A. Porter and H. P. Siy and C. A. Toman and L. G. Votta An experiment to assess the cost-benefits of code inspections in large scale software development . . . . 329--346 B. A. Myers and R. G. McDaniel and R. C. Miller and A. S. Ferrency and A. Faulring and B. D. Kyle and A. Mickish and A. Klimovitski and P. Doane The Amulet environment: new models for effective user interface software development . . . . . . . . . . . . . . 347--365 A. Mukherjee and D. P. Siewiorek Measuring software dependability by robustness benchmarking . . . . . . . . 366--378 Qing Hu Evaluating alternative software production functions . . . . . . . . . . 379--387 I. Ripoll and A. Crespo and A. Garcia-Fornes An optimal algorithm for scheduling soft aperiodic tasks in dynamic-priority preemptive systems . . . . . . . . . . . 388--400
G. S. Novak Software reuse by specialization of generic procedures through views . . . . 401--417 A. Sen The role of opportunism in the software design reuse process . . . . . . . . . . 418--436 D. M. Cohen and S. R. Dalal and M. L. Fredman and G. C. Patton The AETG system: an approach to testing based on combinatorial design . . . . . 437--444 R. Mili and A. Mili and R. T. Mittermeir Storing and retrieving software components: a refinement based system 445--460 L. J. Holtzblatt and R. L. Piazza and H. B. Reubenstein and S. N. Roberts and D. R. Harris Design recovery for distributed systems 461--472
M. J. Gallagher and V. Lakshmi Narasimhan ADTEST: a test data generation suite for Ada software systems . . . . . . . . . . 473--484 K. Pillai and V. S. Sukumaran Nair A model for software development effort and cost estimation . . . . . . . . . . 485--497 D. Binkley Semantics guided regression test cost reduction . . . . . . . . . . . . . . . 498--516 M. Y. Wu and W. Shu On parallelization of static scheduling algorithms . . . . . . . . . . . . . . . 517--528 N. B. Ebrahimi On the statistical analysis of the number of errors remaining in a software design document after inspection . . . . 529--532 H. Zuse Reply to: ``Property-based software engineering measurement'' . . . . . . . 533
Nam-Yong Lee and C. R. Litecky An empirical study of software reuse with special attention to Ada . . . . . 537--549 R. Focardi and R. Gorrieri The Compositional Security Checker: a tool for the verification of information flow security properties . . . . . . . . 550--571 A. Coen-Porisini and C. Ghezzi and R. A. Kemmerer Specification of realtime systems using ASTRAL . . . . . . . . . . . . . . . . . 572--598 T. F. Abdelzaher and K. G. Shin Comment on ``A pre-run-time scheduling algorithm for hard real-time systems'' 599--600
Anonymous Real-time Systems Symposium (RTSS'96) 0:1--0:1 Sang H. Son Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 601--602 J. Sun and M. K. Gardner and J. W. S. Liu Bounding completion times of jobs with arbitrary release times, variable execution times and resource sharing . . 603--615 A. Mehra and A. Indiresan and K. G. Shin Structuring communication software for quality-of-service guarantees . . . . . 616--634 A. K. Mok and D. Chen A multiframe model for real-time tasks 635--645 K. Audenaert Clock trees: logical clocks for programs with nested parallelism . . . . . . . . 646--658 G. Lowe and B. Roscoe Using CSP to detect errors in the TMN protocol . . . . . . . . . . . . . . . . 659--669
B. Littlewood and D. Wright Some conservative stopping rules for the operational testing of safety critical software . . . . . . . . . . . . . . . . 673--683 C. J. Walter and P. Lincoln and N. Suri Formally verified on-line diagnosis . . 684--721 R. Mahajan and B. Shneiderman Visual and textual consistency checking tools for graphical user interfaces . . 722--735 M. Shepperd and C. Schofield Estimating software project effort using analogies . . . . . . . . . . . . . . . 736--743
Dar-Tzen Peng and K. G. Shin and T. F. Abdelzaher Assignment and scheduling communicating periodic tasks in distributed real-time systems . . . . . . . . . . . . . . . . 745--758 D. B. Stewart and R. A. Volpe and P. K. Khosla Design of dynamically reconfigurable real-time software using port-based objects . . . . . . . . . . . . . . . . 759--776 G. Costagliola and A. De Lucia and S. Orefice and G. Tortora A parsing methodology for the implementation of visual systems . . . . 777--799 Anonymous 1997 Index \booktitleIEEE Transactions on Software Vol. 23 . . . . . . . . . . 800--807
S. Easterbrook and R. Lutz and R. Covington and J. Kelly and Y. Ampo and D. Hamilton Experiences using lightweight formal methods for requirements modeling . . . 4--14 M. Neil and G. Ostrolenk and M. Tobin and M. Southworth Lessons from using Z to specify a software tool . . . . . . . . . . . . . 15--23 Shaoying Liu and A. J. Offutt and C. Ho-Stuart and Y. Sun and M. Ohba SOFL: a formal engineering methodology for industrial applications . . . . . . 24--45 B. Chetali Formal verification of concurrent programs using the Larch prover . . . . 46--62 A. Arora and S. S. Kulkarni Component based design of multitolerant systems . . . . . . . . . . . . . . . . 63--78 L. M. Seiter and J. Palsberg and K. J. Lieberherr Evolution of object behavior using context relations . . . . . . . . . . . 79--92 Anonymous Author index . . . . . . . . . . . . . . 93--95
P. J. McCann and G. C. Roman Compositional programming abstractions for mobile computing . . . . . . . . . . 97--110 J. M. Bieman and Byung-Kyoo Kang Measuring design-level cohesion . . . . 111--124 J. Carreira and H. Madeira and J. G. Silva Xception: a technique for the experimental evaluation of dependability in modern computers . . . . . . . . . . 125--136 A. L. Lederer and J. Prasad A causal model for software cost estimating error . . . . . . . . . . . . 137--148 L. Alvisi and K. Marzullo Message logging: pessimistic, optimistic, causal, and optimal . . . . 149--159
D. K. Peters and D. L. Parnas Using test oracles generated from program documentation . . . . . . . . . 161--173 A. Sutcliffe and N. Maiden The domain theory for requirements engineering . . . . . . . . . . . . . . 174--196 S. Jarzabek Design of flexible static program analyzers with PQL . . . . . . . . . . . 197--215 A. Sowmya and S. Ramesh Extending statecharts with temporal logic . . . . . . . . . . . . . . . . . 216--231
M. Snoeck and G. Dedene Existence dependency: The key to semantic integrity between structural and behavioral aspects of object types 233--251 Y. M. Huang and C. V. Ravishankar Constructive protocol specification using Cicero . . . . . . . . . . . . . . 252--267 S. McLellan and A. Roesler and Z. Fei and S. Chandran and C. Spinuzzi Experience using Web-based shotgun measures for large-system characterization and improvement . . . . 268--277 B. Kitchenham A procedure for analyzing unbalanced datasets . . . . . . . . . . . . . . . . 278--301 L. Prechelt and W. F. Tichy A controlled experiment to assess the benefits of procedure argument type checking . . . . . . . . . . . . . . . . 302--312
Anonymous Special Issue --- Mobility and Network-Aware Computing . . . . . . . . 0:1--0:1 G. C. Roman and C. Ghezzi Introduction to the special issue . . . 313--314 R. De Nicola and G. L. Ferrari and R. Pugliese KLAIM: a kernel language for agents interaction and mobility . . . . . . . . 315--330 M. Wermelinger and J. L. Fiadeiro Connectors for mobile programs . . . . . 331--341 A. Fuggetta and G. P. Picco and G. Vigna Understanding code mobility . . . . . . 342--361 P. Ciancarini and R. Tolksdorf and F. Vitali and D. Rossi and A. Knoche Coordinating multiagent applications on the WWW: a reference architecture . . . 362--375 J. Bolliger and T. Gross A framework based approach to the development of network aware applications . . . . . . . . . . . . . . 376--390 S. Liu and A. J. Offutt and C. Ho-Stuart Correction to ``SOFL: A formal engineering methodology for industrial applications'' . . . . . . . . . . . . . 390--390 G. Welling and B. R. Badrinath An architecture for exporting environment awareness to mobile computing applications . . . . . . . . . 391--400
G. Rothermel and M. J. Harrold Empirical studies of a safe regression test selection technique . . . . . . . . 401--419 M. E. Helander and Ming Zhao and N. Ohlsson Planning models for software reliability and cost . . . . . . . . . . . . . . . . 420--434 A. Arora and S. S. Kulkarni Designing masking fault-tolerance via nonmasking fault-tolerance . . . . . . . 435--450 A. Waheed and D. T. Rover and J. K. Hollingsworth Modeling and evaluating design alternatives for an on-line instrumentation system: a case study . . 451--470 R. H. Carver and Kuo-Chung Tai Use of sequencing constraints for specification-based testing of concurrent programs . . . . . . . . . . 471--490 R. Harrison and S. J. Counsell and R. V. Nithi An evaluation of the MOOD set of object-oriented software metrics . . . . 491--496
D. Garlan Guest Editorial. Introduction to the Special Section . . . . . . . . . . . . 497--497 W. Chan and R. J. Anderson and P. Beame and S. Burns and F. Modugno and D. Notkin and J. D. Reese Model checking large software specifications . . . . . . . . . . . . . 498--520 D. Le Metayer Describing software architecture styles using graph grammars . . . . . . . . . . 521--533 W. G. Griswold and M. I. Chen and R. W. Bowdidge and J. L. Cabaniss and V. B. Nguyen and J. D. Morgenthaler Tool support for planning the restructuring of data abstractions in large systems . . . . . . . . . . . . . 534--558 C. B. Seaman and V. R. Basili Communication and organization: an empirical study of discussion in inspection meetings . . . . . . . . . . 559--572 K. M. Hansen and A. P. Ravn and V. Stavridou From safety analysis to software requirements . . . . . . . . . . . . . . 573--584
A. Fuggetta and R. N. Taylor Introduction to the Special Section . . 585--585 P. G. Frankl and R. G. Hamlet and B. Littlewood and L. Strigini Evaluating testing methods by delivered reliability [software] . . . . . . . . . 586--601 G. S. Avrunin and J. C. Corbett and L. K. Dillon Analyzing partially-implemented real-time systems . . . . . . . . . . . 602--614 A. H. Dutoit and B. Bruegge Communication metrics for software development . . . . . . . . . . . . . . 615--628 S. R. Chidamber and D. P. Darcy and C. F. Kemerer Managerial use of metrics for object-oriented software: an exploratory analysis . . . . . . . . . . . . . . . . 629--639 T. L. Roberts and M. L. Gibson and K. T. Fields and R. K. Rainer Factors that impact implementing a system development methodology . . . . . 640--649 J. E. Cook and L. G. Votta and A. L. Wolf Cost-effective analysis of in-place software processes . . . . . . . . . . . 650--663 M. Hurfin and M. Mizuno and M. Raynal and M. Singhal Efficient distributed detection of conjunctions of local predicates . . . . 664--677
M. Jazayeri Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 681--681 Yih-Fam Chen and E. R. Gansner and E. Koutsofios A C++ data model supporting reachability analysis and dead code detection . . . . 682--694 J. Desharnais and M. Frappier and R. Khedri and A. Mili Integration of sequential scenarios . . 695--708 J. Rushby and S. Owre and N. Shankar Subtypes for specifications: predicate subtyping in PVS . . . . . . . . . . . . 709--720 G. Canfora and A. Cimitile and U. De Carlini and A. De Lucia An extensible system for source code analysis . . . . . . . . . . . . . . . . 721--740 S. Schneider Verifying authentication protocols in CSP . . . . . . . . . . . . . . . . . . 741--758 Xiping Song and L. J. Osterweil Engineering software design processes to guide process execution . . . . . . . . 759--775
Yow-Jian Lin and M. Jazayeri Managing Feature Interactions Telecommunications Software Systems --- Guest Editorial . . . . . . . . . . . . 777--778 D. O. Keck and P. J. Kuehn The feature and service interaction problem in telecommunications systems: a survey . . . . . . . . . . . . . . . . . 779--796 F. J. Lin and Hong Liu and A. Ghosh A methodology for feature interaction detection in the AIN 0.1 framework . . . 797--817 S. Tsang and E. H. Magill Learning to detect and avoid run-time feature interactions in intelligent networks . . . . . . . . . . . . . . . . 818--830 M. Jackson and P. Zave Distributed feature composition: a virtual architecture for telecommunications services . . . . . . 831--847 S. Bhansali and T. J. Hoar Automated software synthesis: an application in mechanical CAD . . . . . 848--862 A. Lecerof and F. Paterno Automatic support for usability evaluation . . . . . . . . . . . . . . . 863--888 D. D. Deavours and W. H. Sanders ``On-the-fly'' solution techniques for stochastic Petri nets and extensions . . 889--902
A. van Lamsweerde and R. Darimont and E. Letier Managing conflicts in goal-driven requirements engineering . . . . . . . . 908--926 C. Heitmeyer and J. Kirby and B. Labaw and M. Archer and R. Bharadwaj Using abstraction and model checking to detect safety violations in requirements specifications . . . . . . . . . . . . . 927--948 M. S. Feather Rapid application of lightweight formal methods for consistency analyses . . . . 949--959 J. Grundy and J. Hosking and W. B. Mugridge Inconsistency management for multiple-view software development environments . . . . . . . . . . . . . . 960--981 G. Cugola Tolerating deviations in process support systems via flexible enactment of process models . . . . . . . . . . . . . 982--1001 N. E. Fenton and M. Neil A strategy for improving safety related software engineering standards . . . . . 1002--1013 Zhen Liu Performance analysis of stochastic timed Petri nets using linear programming approach . . . . . . . . . . . . . . . . 1014--1030
M. Jarke and R. Kurki-Suonio Introduction to the special issue . . . 1033--1035 P. Haumer and K. Pohl and K. Weidenhaupt Requirements elicitation and validation with real world scenes . . . . . . . . . 1036--1054 C. Rolland and C. Souveyet and C. B. Achour Guiding goal modeling using scenarios 1055--1071 A. G. Sutcliffe and N. A. M. Maiden and S. Minocha and D. Manuel Supporting scenario-based requirements engineering . . . . . . . . . . . . . . 1072--1088 A. van Lamsweerde and L. Willemet Inferring declarative requirements specifications from operational scenarios . . . . . . . . . . . . . . . 1089--1114 Woo Jin Lee and Sung Deok Cha and Yong Rae Kwon Integration and analysis of use cases using modular Petri nets in requirements engineering . . . . . . . . . . . . . . 1115--1130 R. J. A. Buhr Use case maps as architectural entities for complex systems . . . . . . . . . . 1131--1155 J. M. Carroll and M. B. Rosson and G. Chin and J. Koenemann Requirements development in scenario-based design . . . . . . . . . 1156--1170 O. Stiemerling and A. B. Cremers The use of cooperation scenarios in the design and evaluation of a CSCW system 1171--1181 W. Dzida and R. Freitag Making use of scenarios for validating analysis and design . . . . . . . . . . 1182--1196
C. T. Karamanolis and J. N. Magee Client-access protocols for replicated services . . . . . . . . . . . . . . . . 3--21 G. C. Buttazzo and M. Caccamo Minimizing aperiodic response times in a firm real-time environment . . . . . . . 22--32 F. Borges Paulo and P. C. Masiero and M. C. Ferreira de Oliveira Hypercharts: extended statecharts to support hypermedia specification . . . . 33--49 A. D. Stoyen and T. J. Marlowe and M. F. Younis and P. V. Petrov A development environment for complex distributed real-time applications . . . 50--74 R. K. Joshi and D. J. Ram Anonymous remote computing: a paradigm for parallel programming on interconnected workstations . . . . . . 75--90 L. C. Briand and J. W. Daly and J. K. Wust A unified framework for coupling measurement in object-oriented systems 91--121 C. E. Hrischuk and C. Murray Woodside and J. A. Rolia Trace-based load characterization for generating performance software models 122--135 N. B. Ebrahimi How to improve the calibration of cost models . . . . . . . . . . . . . . . . . 136--140 Anonymous 1998 reviewer list . . . . . . . . . . . 141--144
G. Chiola and W. H. Sanders Guest Editorial: Introduction to the Special Section . . . . . . . . . . . . 145--146 J. Campos and S. Donatelli and M. Silva Structured solution of asynchronously communicating stochastic modules . . . . 147--165 P. Buchholz Hierarchical structuring of superposed GSPNs . . . . . . . . . . . . . . . . . 166--181 P. Kemper Transient analysis of superposed GSPNs 182--193 A. Heindl and R. German A fourth-order algorithm with automatic stepsize control for the transient analysis of DSPNs . . . . . . . . . . . 194--206 G. Ciardo and D. M. Nicol and K. S. Trivedi Discrete-event simulation of fluid stochastic Petri nets . . . . . . . . . 207--217 P. J. Haas Estimation methods for nonregenerative stochastic Petri nets . . . . . . . . . 218--236 A. Ferscha Adaptive time warp simulation of timed Petri nets . . . . . . . . . . . . . . . 237--257 Kentaro Go and N. Shiratori A decomposition of a formal specification: an improved constraint-oriented method . . . . . . . 258--273 J. M. Helary and R. H. B. Netzer and M. Raynal Consistency issues in distributed checkpoints . . . . . . . . . . . . . . 274--281 L. Pickard and B. Kitchenham and P. Jones and Qing Hu Comments on: ``Evaluating alternative software production functions'' . . . . 282--285 P. Franki and D. Hamlet and B. Littlewood and L. Strigini Call for papers . . . . . . . . . . . . 286--286
J. C. Ramming and D. S. Wile Guest editorial --- introduction to the special section . . . . . . . . . . . . 289--290 C. Elliott An embedded modeling language approach to interactive 3D and multimedia animation . . . . . . . . . . . . . . . 291--308 L. Cardelli and R. Davies Service combinators for Web computing 309--316 S. Chandra and B. Richards and J. R. Larus Teapot: a domain-specific language for writing cache coherence protocols . . . 317--333 D. L. Atkins and T. Ball and G. Bruns and K. Cox Mawl: a domain-specific language for form-based services . . . . . . . . . . 334--346 F. Bertrand and M. Augeraud BDL: a specialized language for per-object reactive control . . . . . . 347--362 S. A. Thibault and R. Marlet and C. Consel Domain-specific languages: from design to implementation application to video device drivers generation . . . . . . . 363--377 N. Klarlund and M. I. Schwartzbach A domain-specific language for regular sets of strings and trees . . . . . . . 378--386 D. R. Engler Interface compilation: steps toward compiling program interfaces as languages . . . . . . . . . . . . . . . 387--400 T. A. Varvarigou and M. E. Anagnostou and S. R. Ahuja Reconfiguration models and algorithms for stateful interactive processes . . . 401--415 P. Caspi and A. Girault and D. Pilaud Automatic distribution of reactive systems for asynchronous networks of processors . . . . . . . . . . . . . . . 416--427 S. D. Lang An extended banker's algorithm for deadlock avoidance . . . . . . . . . . . 428--432
D. R. Jeffery and L. G. Votta Empirical Software Engineering . . . . . 435--437 G. C. Murphy and R. J. Walker and E. L. A. Banlassad Evaluating emerging software development technologies: lessons learned from assessing aspect-oriented programming 438--455 V. R. Basili and F. Shull and F. Lanubile Building knowledge through families of experiments . . . . . . . . . . . . . . 456--473 K. Torii and K. Matsumoto and K. Nakakoji and Y. Takada and S. Takada and K. Shima Ginger2: an environment for computer-aided empirical software engineering . . . . . . . . . . . . . . 474--492 C. F. Kemerer and S. Slaughter An empirical approach to studying software evolution . . . . . . . . . . . 493--509 I. Myrtveit and E. Stensrud A controlled experiment to assess the benefits of estimating with analogy and regression models . . . . . . . . . . . 510--525 A. von Mayrhauser and S. Lang A coding scheme to support systematic analysis of software comprehension . . . 526--540 R. Agarwal and P. De and A. P. Sinha Comprehending object and process models: an empirical study . . . . . . . . . . . 541--556 C. B. Seaman Qualitative methods in empirical studies of software engineering . . . . . . . . 557--572 S. Chulani and B. Boehm and B. Steece Bayesian analysis of empirical software engineering cost models . . . . . . . . 573--583 K. J. Sullivan and M. Marchukov and J. Socha Analysis of a conflict between aggregation and interface negotiation in Microsoft's Component Object Model . . . 584--599
C. Fetzer and F. Cristian A highly available local leader election service . . . . . . . . . . . . . . . . 603--618 Z. Kalbarczyk and R. K. Iyer and G. L. Ries and J. U. Patel and M. S. Lee and Y. Xiao Hierarchical simulation approach to accurate fault modeling for system dependability evaluation . . . . . . . . 619--632 R. Ortalo and Y. Deswarte and M. Kaaniche Experimenting with quantitative evaluation tools for monitoring operational security . . . . . . . . . . 633--650 J. Rushby Systematic formal verification for fault-tolerant time-triggered algorithms 651--660 W. J. Gutjahr Partition testing vs. random testing: the influence of uncertainty . . . . . . 661--674 N. E. Fenton and M. Neil A critique of software defect prediction models . . . . . . . . . . . . . . . . . 675--689 I. R. Chen and S. A. Banawan Performance and stability analysis of multilevel data structures with deferred reorganization . . . . . . . . . . . . . 690--700 M. F. Younis and T. J. Marlowe and A. D. Stoyen and G. Tsai Statically safe speculative execution for real-time systems . . . . . . . . . 701--721 L. C. Briand and S. Morasca and V. R. Basili Defining and validating measures for object-based high-level design . . . . . 722--743
M. J. Harrold and H. A. Muller Guest editorial: introduction to the special section . . . . . . . . . . . . 747--748 M. Siff and T. Reps Identifying modules via concept analysis 749--768 N. F. Schneidewind Measuring and evaluating maintenance process using reliability, risk, and test metrics . . . . . . . . . . . . . . 769--781 C. Ghezzi and B. Nuseibeh Guest editorial: introduction to the special section . . . . . . . . . . . . 782--783 I. Sommerville and P. Sawyer and S. Viller Managing process inconsistency using viewpoints . . . . . . . . . . . . . . . 784--799 M. S. Krishnan and M. I. Kellner Measuring process consistency: implications for reducing software defects . . . . . . . . . . . . . . . . 800--815 W. N. Robinson and S. D. Pawlowski Managing requirements inconsistency with development goal monitors . . . . . . . 816--835 W. Emmerich and A. Finkelstein and C. Montangero and S. Antonelli and S. Armitage and R. Stevens Managing standards compliance . . . . . 836--851 E. C. Lupu and M. Sloman Conflicts in policy-based distributed systems management . . . . . . . . . . . 852--869 D. J. Simpson and F. W. Burton Space efficient execution of deterministic parallel programs . . . . 870--882
S. B. Yadav and N. G. Shaw and L. Webb and C. Sutcu and T. L. Roberts and M. L. Gibson and R. K. Rainer and K. T. Fields Comments on ``Factors that impact implementing a system development methodology'' [with reply] . . . . . . . 279--286 T. L. Roberts and M. L. Gibson and R. K. Rainer and K. T. Fields Response to ``Comments on factors that impact the implementation of a systems development methodology'' . . . . . . . 282--286
Ki-Seok Bang and Jin-Young Choi and Chuck Yoo Comments on ``The Model Checker SPIN'' 573--576
L. Pike A note on inconsistent axioms in Rushby's ``Systematic formal verification for fault-tolerant time-triggered algorithms'' . . . . . . 347--348